00:00 +0: loading test\core\bitswap\bitswap_service_test.dart
00:00 +0: test\core\bitswap\bitswap_service_test.dart: BitswapService convertToProtoBlock converts Block to proto
00:00 +1: test\core\blockstore_test.dart: Block Tests should create from data
00:00 +2: test\core\blockstore_test.dart: Block Tests should create from data
00:00 +3: test\core\blockstore_test.dart: Block Tests should serialize to/from proto
00:00 +4: test\core\blockstore_test.dart: Block Tests should serialize to/from bitswap proto
00:00 +5: test\core\blockstore_test.dart: BlockStore Tests should start and stop
00:00 +6: test\core\blockstore_test.dart: BlockStore Tests should put and get block
00:00 +7: test\core\blockstore_test.dart: BlockStore Tests should fail to get non-existent block
00:00 +8: test\core\blockstore_test.dart: BlockStore Tests should remove block
00:00 +9: test\core\blockstore_test.dart: BlockStore Tests should get all blocks
00:00 +10: test\core\blockstore_test.dart: BlockStore Tests should get status
00:00 +11: test\core\block_dag_test.dart: Block fromData computes CID and stores data
00:00 +12: test\core\block_dag_test.dart: Block validate returns true for correct data
00:00 +13: test\core\block_dag_test.dart: Block validate returns false for corrupted data
00:00 +14: test\core\block_dag_test.dart: Block validateSync performs structural checks
00:00 +15: test\core\block_dag_test.dart: Block operator == and hashCode deep dive
00:00 +16: test\core\block_dag_test.dart: Block proto roundtrip
00:00 +17: test\core\block_dag_test.dart: Block Bitswap and raw bytes conversion
00:00 +18: test\core\block_dag_test.dart: MerkleDAGNode create and toBytes/fromBytes
00:00 +19: test\core\block_dag_test.dart: MerkleDAGNode cid property computation
00:00 +20: test\core\block_dag_test.dart: MerkleDAGNode toString and HAMTShard coverage
00:00 +21: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds offline node correctly
2026-02-02T15:34:29.769646 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
00:00 +22: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds online node correctly
00:00 +22: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds offline node correctly
2026-02-02T15:34:29.809729 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:29.812319 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:34:29.812319 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:34:29.813319 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:34:29.813824 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:34:29.813824 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:34:29.815884 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:34:29.816927 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:34:29.816927 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:34:29.909656 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:34:29.910656 [FINE] [NetworkHandler] [VERBOSE] Router initialized successfully
2026-02-02T15:34:29.910656 [FINE] [NetworkHandler] [VERBOSE] Setting up network event handlers
2026-02-02T15:34:29.910656 [FINE] [NetworkHandler] [VERBOSE] Event handlers configured
2026-02-02T15:34:29.910656 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:34:29.914662 [FINE] [MDNSHandler] [DEBUG] MDNSHandler instance created
2026-02-02T15:34:29.956980 [FINE] [Libp2pRouter] [DEBUG] Registered protocol pubsub
2026-02-02T15:34:29.958552 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:34:29.958552 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:34:29.958552 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/bitswap/1.2.0
2026-02-02T15:34:29.959563 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:34:29.959563 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/bitswap/1.2.0
2026-02-02T15:34:29.959563 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:34:29.959563 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:34:29.960712 [FINE] [BootstrapHandler] [DEBUG] Creating new BootstrapHandler instance
2026-02-02T15:34:29.961743 [FINE] [ContentRoutingHandler] [DEBUG] ContentRoutingHandler instance created
2026-02-02T15:34:29.963566 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler instance created
2026-02-02T15:34:29.964572 [FINE] [AutoNATHandler] [DEBUG] AutoNATHandler instance created
2026-02-02T15:34:29.966672 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
00:00 +23: test\core\car_full_test.dart: CAR Utilities Deep Coverage CAR constructor and basic properties
00:00 +23: test\core\builders\ipfs_node_builder_test.dart: IpfsNodeBuilder builds offline node correctly
2026-02-02T15:34:29.990053 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:29.990053 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:34:29.990053 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:34:29.991053 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:34:29.991053 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:34:29.991053 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:34:29.991053 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:34:29.991053 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:34:29.992052 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:34:30.002422 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:34:30.003426 [FINE] [NetworkHandler] [VERBOSE] Router initialized successfully
2026-02-02T15:34:30.003426 [FINE] [NetworkHandler] [VERBOSE] Setting up network event handlers
2026-02-02T15:34:30.004426 [FINE] [NetworkHandler] [VERBOSE] Event handlers configured
2026-02-02T15:34:30.004426 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:34:30.004426 [FINE] [MDNSHandler] [DEBUG] MDNSHandler instance created
2026-02-02T15:34:30.004426 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:34:30.004426 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:34:30.005425 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/bitswap/1.2.0
2026-02-02T15:34:30.005425 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:34:30.005425 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/bitswap/1.2.0
2026-02-02T15:34:30.005425 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:34:30.006425 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:34:30.006425 [FINE] [BootstrapHandler] [DEBUG] Creating new BootstrapHandler instance
2026-02-02T15:34:30.006425 [FINE] [ContentRoutingHandler] [DEBUG] ContentRoutingHandler instance created
2026-02-02T15:34:30.006425 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler instance created
2026-02-02T15:34:30.006425 [FINE] [AutoNATHandler] [DEBUG] AutoNATHandler instance created
00:00 +24: test\core\car_full_test.dart: CAR Utilities Deep Coverage CAR constructor and basic properties
00:00 +25: test\core\car_full_test.dart: CAR Utilities Deep Coverage CAR constructor and basic properties
00:00 +26: test\core\car_full_test.dart: CAR Utilities Deep Coverage CAR.v2WithIndex with empty blocks
00:00 +27: test\core\car_full_test.dart: CAR Utilities Deep Coverage loadSelected full verification
00:00 +28: test\core\car_full_test.dart: CAR Utilities Deep Coverage CarHeader toProto verification
00:00 +29: test\core\car_full_test.dart: CAR Utilities Deep Coverage CarIndex manual entries and methods
00:00 +30: test\core\car_full_test.dart: CAR Utilities Deep Coverage CAR fromBytes/toBytes roundtrip with index and pragma
00:00 +31: test\core\car_full_test.dart: CAR Utilities Deep Coverage CarReader/Writer edge cases
00:00 +32: test\core\car_full_test.dart: CAR Utilities Deep Coverage CarIndex.generate loop coverage
00:01 +33: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests Initialization creates reader with byte list
00:01 +34: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests Initialization creates reader with empty list
00:01 +35: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests Initialization initial position is zero
00:01 +36: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests readByte reads single byte and advances position
00:01 +37: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests readByte reads bytes sequentially
00:01 +38: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests readByte throws StateError when no bytes remain
00:01 +39: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests readByte throws StateError on empty reader
00:01 +40: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests readByte handles binary values correctly
00:01 +41: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests readBytes reads multiple bytes at once
00:01 +42: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests readBytes reads all remaining bytes
00:01 +43: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests readBytes reads zero bytes
00:01 +44: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests readBytes throws StateError when insufficient bytes
00:01 +45: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests readBytes sequential readBytes calls
00:01 +46: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests readBytes mixed readByte and readBytes
00:01 +47: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests isBreak returns true when next byte is 0xFF
00:01 +48: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests isBreak returns false when next byte is not 0xFF
00:01 +49: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests isBreak returns false when no bytes remaining
00:01 +50: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests isBreak isBreak after consuming bytes
00:01 +51: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests isBreak isBreak does not consume byte
00:01 +52: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests remaining returns all bytes initially
00:01 +53: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests remaining returns remaining after reading
00:01 +54: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests remaining returns empty list when all consumed
00:01 +55: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests hasRemaining returns true when bytes available
00:01 +56: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests hasRemaining returns false when all bytes consumed
00:01 +57: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests hasRemaining returns false for empty reader
00:01 +58: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests hasRemaining updates after each read
00:01 +59: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests position tracks read position accurately
00:01 +60: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests position position equals length when all consumed
00:01 +61: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests Edge Cases handles large byte arrays
00:01 +62: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests Edge Cases handles all-zero bytes
00:01 +63: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests Edge Cases handles all-max bytes
00:01 +64: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests Edge Cases single byte reader
00:01 +65: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests Error Conditions readBytes with negative count throws
00:01 +66: test\core\cbor\byte_reader_comprehensive_test.dart: ByteReader - Comprehensive Tests Error Conditions multiple reads past end all throw
00:01 +67: test\core\cbor\byte_reader_test.dart: ByteReader readByte moves position
00:01 +68: test\core\cbor\byte_reader_test.dart: ByteReader readByte throws at end
00:01 +69: test\core\cbor\byte_reader_test.dart: ByteReader readBytes returns correct sublist
00:01 +70: test\core\cbor\byte_reader_test.dart: ByteReader readBytes throws if not enough
00:01 +71: test\core\cbor\byte_reader_test.dart: ByteReader isBreak detects 0xFF
00:01 +72: test\core\cbor\byte_reader_test.dart: ByteReader hasRemaining and remaining
00:01 +73: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Tags cborTags contains correct mappings
00:01 +74: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes primitives
00:01 +75: test\core\cid_coverage_test.dart: CID Coverage Expansion encode/decode (string representation)
00:01 +76: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes BYTES (Tag 45)
00:01 +77: test\core\cid_coverage_test.dart: CID Coverage Expansion fromProto and toProto
00:01 +78: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes CID LINK (Tag 6)
00:01 +79: test\core\cid_coverage_test.dart: CID Coverage Expansion fromContent
00:01 +80: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes CID V1 LINK (Tag 6)
00:01 +81: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes CID V1 LINK (Tag 6)
00:01 +82: test\core\cid_coverage_test.dart: CID Coverage Expansion operator == and hashCode
00:01 +83: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes LIST and MAP
00:01 +84: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes LIST and MAP
00:01 +85: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes LIST and MAP
00:01 +86: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes LIST and MAP
00:01 +87: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes LIST and MAP
00:01 +88: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes LIST and MAP
00:01 +89: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes LIST and MAP
00:01 +90: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Encoding encodes and decodes LIST and MAP
00:01 +91: test\core\cid_coverage_test.dart: CID Coverage Expansion error paths
00:01 +92: test\core\cid_coverage_test.dart: CID Coverage Expansion error paths
00:01 +93: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler MerkleDAG Conversion convertToMerkleLink converts IPLDNode map back to Link
00:01 +94: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler MerkleDAG Conversion convertToMerkleLink handles hash as bytes (legacy)
00:01 +95: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler MerkleDAG Conversion convertToMerkleLink throws if not MAP
00:01 +96: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Error Handling convertCborValueToIPLDNode throws on unsupported type
00:01 +97: test\core\cbor\enhanced_cbor_handler_test.dart: EnhancedCBORHandler Tag 42 (DAG-PB) Decoding decodes DAG-PB tag correctly
00:01 +98: test\core\cid_test.dart: CID v0 creates valid CIDv0
00:01 +99: test\core\cid_test.dart: CID v1 creates valid CIDv1 with different codecs
00:01 +100: test\core\cid_test.dart: CID toBytes and fromBytes round trip
00:01 +101: test\core\cid_test.dart: CID toBytes throws on unsupported codec
00:01 +102: test\core\cid_test.dart: CID validate returns true for valid CIDs
00:01 +103: test\core\cid_verified_test.dart: CID - Verified API Tests CID Creation computeForDataSync creates CID from data
00:01 +104: test\core\cid_verified_test.dart: CID - Verified API Tests CID Creation computeForDataSync with different codecs
00:01 +105: test\core\cid_verified_test.dart: CID - Verified API Tests CID Creation same data produces same CID
00:01 +106: test\core\cid_verified_test.dart: CID - Verified API Tests CID Creation different data produces different CIDs
00:01 +107: test\core\cid_verified_test.dart: CID - Verified API Tests CID Encoding/Decoding encode and decode round-trip
00:01 +108: test\core\cid_verified_test.dart: CID - Verified API Tests CID Encoding/Decoding toString returns encoded string
00:01 +109: test\core\cid_verified_test.dart: CID - Verified API Tests CID Encoding/Decoding decode handles CIDv0 format (Qm prefix)
00:01 +110: test\core\cid_verified_test.dart: CID - Verified API Tests CID Encoding/Decoding decode throws on empty string
00:01 +111: test\core\cid_verified_test.dart: CID - Verified API Tests CID Encoding/Decoding toBytes returns Uint8List
00:01 +112: test\core\cid_verified_test.dart: CID - Verified API Tests CID Encoding/Decoding fromBytes round-trip
00:01 +113: test\core\cid_verified_test.dart: CID - Verified API Tests CID Encoding/Decoding fromBytes throws on empty bytes
00:01 +114: test\core\cid_verified_test.dart: CID - Verified API Tests CID Properties version property is accessible
00:01 +115: test\core\cid_verified_test.dart: CID - Verified API Tests CID Properties codec property is accessible
00:01 +116: test\core\cid_verified_test.dart: CID - Verified API Tests CID Properties multihash property exists
00:01 +117: test\core\cid_verified_test.dart: CID - Verified API Tests CID Properties validate returns true for valid CID
00:01 +118: test\core\cid_verified_test.dart: CID - Verified API Tests CID Comparison equality operator works
00:01 +119: test\core\cid_verified_test.dart: CID - Verified API Tests CID Comparison inequality works
00:01 +120: test\core\cid_verified_test.dart: CID - Verified API Tests CID Comparison identical CIDs are equal
00:01 +121: test\core\cid_verified_test.dart: CID - Verified API Tests Edge Cases handles empty data
00:01 +122: test\core\cid_verified_test.dart: CID - Verified API Tests Edge Cases handles large data
00:02 +123: test\core\cid_verified_test.dart: CID - Verified API Tests Edge Cases handles binary data
00:02 +124: test\core\cid_verified_test.dart: CID - Verified API Tests Edge Cases handles UTF-8 special characters
00:02 +125: test\core\cid_verified_test.dart: CID - Verified API Tests Codec Variations raw codec
00:02 +126: test\core\cid_verified_test.dart: CID - Verified API Tests Codec Variations dag-pb codec
00:02 +127: test\core\cid_verified_test.dart: CID - Verified API Tests Codec Variations dag-cbor codec
00:02 +128: test\core\cid_verified_test.dart: CID - Verified API Tests fromContent Factory creates CID from content
00:02 +129: test\core\cid_verified_test.dart: CID - Verified API Tests fromContent Factory fromContent with custom codec
00:02 +130: test\core\cid_verified_test.dart: CID - Verified API Tests fromContent Factory fromContent with custom hash
00:02 +131: test\core\cid_verified_test.dart: CID - Verified API Tests Protobuf Conversion toProto converts to protobuf
00:02 +132: test\core\cid_verified_test.dart: CID - Verified API Tests Protobuf Conversion fromProto round-trip
00:02 +133: test\core\config\config_test.dart: MetricsConfig defaults
00:02 +134: test\core\config\config_test.dart: MetricsConfig fromJson/toJson
00:02 +135: test\core\config\config_test.dart: StorageConfig defaults
00:02 +136: test\core\config\config_test.dart: StorageConfig helpers
00:02 +137: test\core\config\config_test.dart: StorageConfig fromJson/toJson
00:02 +138: test\core\config\config_test.dart: NetworkConfig defaults
00:02 +139: test\core\config\config_test.dart: NetworkConfig fromJson/toJson
00:02 +140: test\core\config\config_test.dart: IPFSConfig defaults
00:02 +141: test\core\config\config_test.dart: IPFSConfig withDefaults factory
00:02 +142: test\core\config\config_test.dart: IPFSConfig fromJson/toJson
00:02 +143: test\core\config\ipfs_config_test.dart: IPFSConfig default constructor values
00:02 +144: test\core\config\ipfs_config_test.dart: IPFSConfig withDefaults factory
00:02 +145: test\core\config\ipfs_config_test.dart: IPFSConfig toJson / fromJson roundrip
00:02 +146: test\core\config\ipfs_config_test.dart: IPFSConfig fromJson with empty Map
00:02 +147: test\core\config\ipfs_config_test.dart: IPFSConfig fromFile - YAML support
00:02 +148: test\core\config\ipfs_config_test.dart: IPFSConfig customConfig storage
00:02 +149: test\core\config\metrics_config_test.dart: MetricsConfig default values
00:02 +150: test\core\config\metrics_config_test.dart: MetricsConfig toJson and fromJson roundtrip
00:02 +151: test\core\config\metrics_config_test.dart: MetricsConfig fromJson with empty Map
00:02 +152: test\core\config\network_config_test.dart: NetworkConfig defaults are correct
00:02 +153: test\core\config\network_config_test.dart: NetworkConfig fromJson parses correctly
00:02 +154: test\core\config\network_config_test.dart: NetworkConfig toJson and fromJson work correctly
00:02 +155: test\core\crypto\crypto_utils_test.dart: CryptoUtils deriveKey derives consistent key from password and salt
00:03 +156: test\core\crypto\crypto_utils_test.dart: CryptoUtils deriveKey derives different keys with different salts
00:03 +157: test\core\crypto\crypto_utils_test.dart: CryptoUtils deriveKey derives different keys with different passwords
00:03 +158: test\core\crypto\crypto_utils_test.dart: CryptoUtils deriveKey supports custom key length
00:03 +159: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer generateKeyPair without seed
00:03 +160: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer generateKeyPair without seed
00:03 +161: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer generateKeyPair without seed
00:03 +162: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer generateKeyPair without seed
00:03 +163: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer generateKeyPair without seed
00:03 +164: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer generateKeyPair without seed
00:03 +165: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer generateKeyPair without seed
00:03 +166: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer generateKeyPair without seed
00:03 +167: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer generateKeyPair without seed
00:03 +168: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer generateKeyPair without seed
00:03 +169: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer generateKeyPair without seed
00:03 +170: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer generateKeyPair without seed
00:03 +171: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer generateKeyPair with seed
00:03 +172: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer generateKeyPair with invalid seed length
00:03 +173: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer keyPairFromSeed
00:03 +174: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer keyPairFromSeed with invalid seed length
00:03 +175: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer sign and verify roundtrip
00:03 +176: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer verify failure with wrong data
00:03 +177: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer verify failure with catch path
00:03 +178: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer extractPublicKeyBytes
00:03 +179: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer extractSeed
00:03 +180: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer publicKeyFromBytes
00:03 +181: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer publicKeyFromBytes invalid length
00:03 +182: test\core\crypto\ed25519_signer_test.dart: Ed25519Signer KeyPairExtensions.extractSeedAndZero
00:04 +183: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeyEntry toJson serializes correctly
00:04 +184: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeyEntry fromJson deserializes correctly
00:04 +185: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle isUnlocked is false by default
00:04 +186: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:04 +187: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:04 +188: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:04 +189: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:04 +190: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:04 +191: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:04 +192: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:04 +192: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:34:33.976364 [SEVERE] [DatastoreHandler] [ERROR] Error storing block with CID bbkujcby5qyrbjr7a4csnpx5gitfx3sjbhvza6ize3sngkjfmzdn4ffocv: Exception: Put failed
2026-02-02T15:34:33.989887 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:04 +193: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:04 +193: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:34:33.993417 [SEVERE] [DatastoreHandler] [ERROR] Error retrieving block with CID QmSomeCid: Exception: Get failed
2026-02-02T15:34:33.993417 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:04 +194: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:04 +194: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:34:34.001622 [SEVERE] [DatastoreHandler] [ERROR] Error checking existence of block with CID QmSomeCid: Exception: Has failed
2026-02-02T15:34:34.002691 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:04 +195: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:04 +195: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:34:34.004193 [SEVERE] [DatastoreHandler] [ERROR] Error initializing datastore: Exception: Init failed
2026-02-02T15:34:34.005697 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:04 +196: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:04 +196: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:34:34.010669 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
2026-02-02T15:34:34.010669 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:04 +197: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:04 +197: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:34:34.016361 [SEVERE] [DatastoreHandler] [ERROR] Error loading pinned CIDs: Exception: Query failed
2026-02-02T15:34:34.016361 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:04 +198: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:04 +198: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:34:34.019865 [SEVERE] [DatastoreHandler] [ERROR] Error persisting pinned CIDs: Exception: Query failed
2026-02-02T15:34:34.020883 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:04 +199: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:04 +199: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:34:34.025912 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:04 +200: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:04 +200: test\core\datastore_handler_test.dart: DatastoreHandler Tests should put and get blocks
2026-02-02T15:34:34.028171 [SEVERE] [DatastoreHandler] [ERROR] Error retrieving block with CID QmSomeCid: Exception: Get failed
2026-02-02T15:34:34.028171 [SEVERE] [DatastoreHandler] [ERROR] Error exporting CAR file for CID QmSomeCid: Invalid argument(s): Root block not found for CID: QmSomeCid
2026-02-02T15:34:34.029207 [SEVERE] [DatastoreHandler] [ERROR] Error closing datastore: Exception: Close failed
00:04 +201: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +202: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +203: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +204: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +205: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +206: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +207: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +208: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +209: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +210: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +211: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +212: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +213: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +214: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +215: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +216: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +217: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +218: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +219: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +220: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle unlock sets isUnlocked to true
00:05 +221: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +222: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +223: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +224: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +225: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +226: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +227: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +228: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +229: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +230: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +231: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +232: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +233: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +234: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +235: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +236: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +237: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +238: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +239: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +240: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:05 +241: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +242: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +243: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +244: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +245: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +246: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +247: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +248: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +249: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +250: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +251: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +252: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +253: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Lifecycle lock sets isUnlocked to false
00:06 +254: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:06 +255: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:06 +256: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:06 +257: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:06 +258: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:06 +259: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:06 +260: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +261: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +262: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +263: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +264: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +265: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +266: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +267: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +268: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +269: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +270: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +271: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +272: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +273: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +274: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +275: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +276: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +277: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey creates new key
00:07 +278: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +279: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +280: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +281: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +282: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +283: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +284: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +285: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +286: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +287: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +288: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +289: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +290: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +291: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +292: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +293: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +294: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +295: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +296: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +297: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +298: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +299: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +300: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +301: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +302: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +303: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +304: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +305: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +306: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +307: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +308: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:08 +309: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:09 +310: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey with label stores label
00:09 +311: test\core\events\event_bus_test.dart: EventBus publish delivers event to subscriber
00:09 +312: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:09 +313: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:09 +314: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:09 +315: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:09 +316: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:09 +317: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:09 +318: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:09 +319: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:09 +320: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:09 +321: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:09 +322: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:09 +323: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:09 +324: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:09 +325: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:09 +326: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +326: loading test\core\ipfs_node\dns_link_handler_test.dart
2026-02-02T15:34:39.513784 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler instance created
2026-02-02T15:34:39.526431 [FINE] [DNSLinkHandler] [DEBUG] Resolving DNSLink for domain: example.com
2026-02-02T15:34:39.528950 [FINE] [DNSLinkHandler] [VERBOSE] Attempting resolution using: https://dnslink.io/
2026-02-02T15:34:39.529455 [FINE] [DNSLinkHandler] [VERBOSE] Querying resolver: https://dnslink.io/
2026-02-02T15:34:39.553859 [FINE] [DNSLinkHandler] [DEBUG] Successfully resolved DNSLink using https://dnslink.io/
2026-02-02T15:34:39.554365 [FINE] [DNSLinkHandler] [VERBOSE] Caching DNSLink result for: example.com
00:10 +327: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +327: loading test\core\ipfs_node\dns_link_handler_test.dart
2026-02-02T15:34:39.566270 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler instance created
2026-02-02T15:34:39.567269 [FINE] [DNSLinkHandler] [DEBUG] Resolving DNSLink for domain: cached.com
2026-02-02T15:34:39.567269 [FINE] [DNSLinkHandler] [VERBOSE] Attempting resolution using: https://dnslink.io/
2026-02-02T15:34:39.567269 [FINE] [DNSLinkHandler] [VERBOSE] Querying resolver: https://dnslink.io/
2026-02-02T15:34:39.568270 [FINE] [DNSLinkHandler] [DEBUG] Successfully resolved DNSLink using https://dnslink.io/
2026-02-02T15:34:39.568270 [FINE] [DNSLinkHandler] [VERBOSE] Caching DNSLink result for: cached.com
2026-02-02T15:34:39.570269 [FINE] [DNSLinkHandler] [DEBUG] Resolving DNSLink for domain: cached.com
2026-02-02T15:34:39.571268 [FINE] [DNSLinkHandler] [VERBOSE] Returning cached DNSLink for: cached.com
00:10 +328: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +328: loading test\core\ipfs_node\dns_link_handler_test.dart
2026-02-02T15:34:39.581656 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler instance created
2026-02-02T15:34:39.581656 [FINE] [DNSLinkHandler] [DEBUG] Resolving DNSLink for domain: fallback.com
2026-02-02T15:34:39.582165 [FINE] [DNSLinkHandler] [VERBOSE] Attempting resolution using: https://dnslink.io/
2026-02-02T15:34:39.582165 [FINE] [DNSLinkHandler] [VERBOSE] Querying resolver: https://dnslink.io/
2026-02-02T15:34:39.583177 [FINE] [DNSLinkHandler] [VERBOSE] Attempting resolution using: https://dnslink-resolver.example.com/
2026-02-02T15:34:39.583177 [FINE] [DNSLinkHandler] [VERBOSE] Querying resolver: https://dnslink-resolver.example.com/
2026-02-02T15:34:39.584683 [FINE] [DNSLinkHandler] [DEBUG] Successfully resolved DNSLink using https://dnslink-resolver.example.com/
2026-02-02T15:34:39.584683 [FINE] [DNSLinkHandler] [VERBOSE] Caching DNSLink result for: fallback.com
00:10 +329: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +329: loading test\core\ipfs_node\dns_link_handler_test.dart
2026-02-02T15:34:39.588897 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler instance created
2026-02-02T15:34:39.588897 [FINE] [DNSLinkHandler] [DEBUG] Resolving DNSLink for domain: failed.com
2026-02-02T15:34:39.588897 [FINE] [DNSLinkHandler] [VERBOSE] Attempting resolution using: https://dnslink.io/
2026-02-02T15:34:39.589897 [FINE] [DNSLinkHandler] [VERBOSE] Querying resolver: https://dnslink.io/
2026-02-02T15:34:39.590402 [FINE] [DNSLinkHandler] [VERBOSE] Attempting resolution using: https://dnslink-resolver.example.com/
2026-02-02T15:34:39.590402 [FINE] [DNSLinkHandler] [VERBOSE] Querying resolver: https://dnslink-resolver.example.com/
2026-02-02T15:34:39.591407 [FINE] [DNSLinkHandler] [VERBOSE] Attempting resolution using: https://ipfs.io/api/v0/dns/
2026-02-02T15:34:39.591923 [FINE] [DNSLinkHandler] [VERBOSE] Querying resolver: https://ipfs.io/api/v0/dns/
2026-02-02T15:34:39.591923 [WARNING] [DNSLinkHandler] [WARNING] Failed to resolve DNSLink for domain: failed.com
00:10 +330: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +330: loading test\core\ipfs_node\dns_link_handler_test.dart
2026-02-02T15:34:39.594329 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler instance created
2026-02-02T15:34:39.594329 [FINE] [DNSLinkHandler] [DEBUG] Starting DNSLinkHandler...
2026-02-02T15:34:39.594329 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler started successfully
2026-02-02T15:34:39.595909 [FINE] [DNSLinkHandler] [DEBUG] Resolving DNSLink for domain: test.com
2026-02-02T15:34:39.595909 [FINE] [DNSLinkHandler] [VERBOSE] Attempting resolution using: https://dnslink.io/
2026-02-02T15:34:39.595909 [FINE] [DNSLinkHandler] [VERBOSE] Querying resolver: https://dnslink.io/
2026-02-02T15:34:39.598039 [FINE] [DNSLinkHandler] [DEBUG] Successfully resolved DNSLink using https://dnslink.io/
2026-02-02T15:34:39.598039 [FINE] [DNSLinkHandler] [VERBOSE] Caching DNSLink result for: test.com
2026-02-02T15:34:39.599160 [FINE] [DNSLinkHandler] [DEBUG] Stopping DNSLinkHandler...
2026-02-02T15:34:39.599160 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler stopped successfully
00:10 +331: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management generateKey throws for duplicate name
00:10 +332: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:10 +333: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:10 +334: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:10 +335: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:10 +335: test\core\ipfs_node\ipld_handler_test.dart: IPLDHandler Codecs put/get raw bytes
2026-02-02T15:34:40.145816 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:40.158839 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:40.158839 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
00:10 +336: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:10 +336: test\core\ipfs_node\ipld_handler_test.dart: IPLDHandler Codecs put/get raw bytes
2026-02-02T15:34:40.169390 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:40.169390 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
00:10 +337: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:10 +338: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:10 +339: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:10 +340: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +341: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +342: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +343: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +344: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +345: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +346: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +347: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +348: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +349: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +350: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +351: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +352: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +353: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +354: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +355: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +356: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +357: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +357: test\core\ipfs_node\network_handler_io_test.dart: NetworkHandler initialization and start
2026-02-02T15:34:40.776965 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:34:40.788746 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:34:40.789756 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:34:40.789756 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:34:40.790759 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:34:40.790759 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:34:40.792230 [FINE] [NetworkHandler] [VERBOSE] Router initialized successfully
2026-02-02T15:34:40.793891 [FINE] [NetworkHandler] [VERBOSE] Setting up network event handlers
2026-02-02T15:34:40.794896 [FINE] [NetworkHandler] [VERBOSE] Event handlers configured
2026-02-02T15:34:40.794896 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:34:40.795845 [FINE] [NetworkHandler] [DEBUG] Starting network services...
2026-02-02T15:34:40.796849 [FINE] [NetworkHandler] [VERBOSE] Initializing router...
2026-02-02T15:34:40.796849 [FINE] [NetworkHandler] [VERBOSE] Router started successfully
2026-02-02T15:34:40.796849 [FINE] [NetworkHandler] [VERBOSE] Initializing circuit relay client...
2026-02-02T15:34:40.799360 [FINE] [NetworkHandler] [VERBOSE] Circuit relay client started successfully
2026-02-02T15:34:40.799360 [FINE] [NetworkHandler] [VERBOSE] Registering AutoNAT dialback protocol handler
2026-02-02T15:34:40.799360 [FINE] [NetworkHandler] [DEBUG] AutoNAT dialback handler registered
2026-02-02T15:34:40.800865 [INFO] [NetworkHandler] [INFO] Network services started successfully
2026-02-02T15:34:40.804420 [FINE] [NetworkHandler] [DEBUG] Stopping network services...
2026-02-02T15:34:40.809569 [FINE] [NetworkHandler] [VERBOSE] Circuit relay client stopped
2026-02-02T15:34:40.810570 [FINE] [NetworkHandler] [VERBOSE] Router stopped
2026-02-02T15:34:40.811569 [FINE] [NetworkHandler] [VERBOSE] Network event subscriptions canceled
2026-02-02T15:34:40.811569 [FINE] [NetworkHandler] [VERBOSE] Network event controller closed
2026-02-02T15:34:40.811569 [INFO] [NetworkHandler] [INFO] Network services stopped successfully
00:11 +358: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +358: test\core\ipfs_node\network_handler_io_test.dart: NetworkHandler initialization and start
2026-02-02T15:34:40.834820 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:34:40.834820 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:34:40.835324 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:34:40.835324 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:34:40.835838 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
00:11 +359: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns true for existing key
00:11 +360: test\core\ipfs_node\network_handler_io_test.dart: NetworkHandler sendMessage encoding
00:11 +360: test\core\ipfs_node\network_handler_io_test.dart: NetworkHandler initialization and start
2026-02-02T15:34:40.844466 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:34:40.844466 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:34:40.844466 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:34:40.844466 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:34:40.844466 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
00:11 +361: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:11 +361: test\core\ipfs_node\network_handler_io_test.dart: NetworkHandler initialization and start
2026-02-02T15:34:40.854747 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:34:40.854747 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:34:40.854747 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:34:40.855746 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:34:40.855746 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
00:11 +362: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:11 +362: test\core\ipfs_node\network_handler_io_test.dart: NetworkHandler initialization and start
2026-02-02T15:34:40.859990 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:34:40.859990 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:34:40.859990 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:34:40.860994 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:34:40.860994 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:34:40.860994 [FINE] [NetworkHandler] [VERBOSE] Testing direct connection to: /ip4/127.0.0.1/tcp/4001
2026-02-02T15:34:40.861993 [FINE] [NetworkHandler] [DEBUG] Successfully tested direct connection to: /ip4/127.0.0.1/tcp/4001
00:11 +363: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:11 +363: test\core\ipfs_node\network_handler_io_test.dart: NetworkHandler initialization and start
2026-02-02T15:34:40.864194 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:34:40.864194 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:34:40.864194 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:34:40.864194 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:34:40.864194 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:34:40.865199 [FINE] [NetworkHandler] [VERBOSE] Starting dialback test
2026-02-02T15:34:40.867742 [FINE] [NetworkHandler] [DEBUG] Dialback test completed successfully
00:11 +364: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +365: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +366: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +366: test\core\ipfs_node\node_handlers_test.dart: RoutingHandler start/stop delegates to ContentRouting
2026-02-02T15:34:41.446333 [INFO] [MDNSHandler] [INFO] MDNSHandler started successfully
2026-02-02T15:34:41.461899 [INFO] [MDNSHandler] [INFO] MDNSHandler stopped successfully
00:12 +367: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +367: test\core\ipfs_node\node_handlers_test.dart: RoutingHandler start/stop delegates to ContentRouting
2026-02-02T15:34:41.475382 [INFO] [MDNSHandler] [INFO] MDNSHandler started successfully
00:12 +368: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +368: test\core\ipfs_node\node_handlers_test.dart: RoutingHandler start/stop delegates to ContentRouting
2026-02-02T15:34:41.486686 [INFO] [AutoNATHandler] [INFO] NAT detected but port mapping is disabled in config
2026-02-02T15:34:41.488191 [INFO] [AutoNATHandler] [INFO] AutoNATHandler started successfully
2026-02-02T15:34:41.490198 [INFO] [NatTraversalService] [INFO] Removing port mappings for port 4001...
2026-02-02T15:34:41.490198 [INFO] [AutoNATHandler] [INFO] AutoNATHandler stopped successfully
00:12 +369: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +370: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +370: test\core\ipfs_node_online_test.dart: IPFSNode Online Tests should initialize and start in online mode
2026-02-02T15:34:41.891718 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:41.919184 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:34:41.920185 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:34:41.920185 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:34:41.922168 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:34:41.922168 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:34:41.942249 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:41.944263 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:41.948015 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:41.954976 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:41.956482 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:12 +371: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +371: test\core\ipfs_node_online_test.dart: IPFSNode Online Tests should initialize and start in online mode
2026-02-02T15:34:41.972754 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:41.973867 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:34:41.973867 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:34:41.973867 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:34:41.975372 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:34:41.975372 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:34:41.976744 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:41.977748 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:41.977748 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
00:12 +372: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +372: test\core\ipfs_node_online_test.dart: IPFSNode Online Tests should initialize and start in online mode
2026-02-02T15:34:42.026088 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:42.027091 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:34:42.028595 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:34:42.029840 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:34:42.029840 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:34:42.030347 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:34:42.033187 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:42.033187 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:42.033187 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
00:12 +373: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +373: test\core\ipfs_node_online_test.dart: IPFSNode Online Tests should initialize and start in online mode
2026-02-02T15:34:42.046335 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:42.046839 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:34:42.047843 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:34:42.047843 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:34:42.048347 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:34:42.048347 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:34:42.051369 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:42.051369 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:42.052374 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
00:12 +374: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +374: test\core\ipfs_node_online_test.dart: IPFSNode Online Tests should initialize and start in online mode
2026-02-02T15:34:42.059691 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:42.060692 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:34:42.060692 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:34:42.060692 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:34:42.061692 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:34:42.061692 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:34:42.063196 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:42.063785 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:42.064327 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
00:12 +375: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:12 +375: test\core\ipfs_node_online_test.dart: IPFSNode Online Tests should initialize and start in online mode
2026-02-02T15:34:42.070495 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:42.071494 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:34:42.071494 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:34:42.071494 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:34:42.072493 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:34:42.073502 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
00:12 +376: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management hasKey returns false for non-existent key
00:13 +377: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns public key bytes
00:13 +377: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:42.426566 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:42.447489 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:42.448575 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:42.449575 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:42.449575 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:42.450574 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:42.454436 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:42.469411 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:42.469411 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:42.470412 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:42.472411 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:13 +378: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns public key bytes
00:13 +378: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:42.494965 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:42.496485 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:42.496485 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:42.496485 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:42.497490 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:42.497490 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:42.497490 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:42.532333 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:42.532333 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:42.533338 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:42.533338 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:13 +379: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns public key bytes
00:13 +379: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:42.543156 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:42.544660 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:42.545664 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:42.546195 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:42.547713 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:42.548280 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:42.548280 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:42.555314 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:42.555314 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:42.555314 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:42.556824 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:13 +380: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns public key bytes
00:13 +380: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:42.567788 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:42.569540 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:42.570047 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:42.570047 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:42.570047 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:42.571063 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:42.571063 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:42.624395 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:42.624395 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:42.624395 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:42.624395 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:13 +381: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns public key bytes
00:13 +381: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:42.633618 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:42.635650 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:42.635650 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:42.636662 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:42.636662 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:42.637666 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:42.637666 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:42.651330 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:42.651330 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:42.651330 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:42.652334 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:13 +382: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns public key bytes
00:13 +382: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:42.659331 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:42.660331 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:42.660331 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:42.660331 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:42.660331 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:42.661331 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:42.661331 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
00:14 +383: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should return null for missing content
00:14 +383: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:43.716328 [WARNING] [HttpGatewayClient] [WARNING] Failed to retrieve CID nonexistentcid from all gateways
2026-02-02T15:34:43.716328 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:43.717332 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:43.717332 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:43.717332 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:14 +384: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:14 +384: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:43.725371 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:43.726376 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:43.726376 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:43.726376 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:43.726376 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:43.726376 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:43.727375 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:43.727789 [INFO] [IPFSNode] [INFO] Switched Gateway Mode to: GatewayMode.internal
2026-02-02T15:34:43.727789 [INFO] [IPFSNode] [INFO] Switched Gateway Mode to: GatewayMode.public
2026-02-02T15:34:43.728293 [INFO] [IPFSNode] [INFO] Switched Gateway Mode to: GatewayMode.local
2026-02-02T15:34:43.728293 [INFO] [IPFSNode] [INFO] Switched Gateway Mode to: GatewayMode.custom
2026-02-02T15:34:43.728293 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:43.728293 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:43.728293 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:43.729304 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:14 +385: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:14 +385: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:43.749089 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:43.751606 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:43.751606 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:43.751606 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:43.752611 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:43.752611 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:43.752611 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:43.755123 [SEVERE] [IPFSNode] [ERROR] Failed to publish: Bad state: PubSubHandler not available
2026-02-02T15:34:43.758122 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:43.758122 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:43.759120 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:43.760120 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:14 +386: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:14 +386: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:43.765119 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:43.766119 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:43.766119 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:43.766119 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:43.766119 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:43.767118 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:43.767118 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:43.768118 [SEVERE] [IPFSNode] [ERROR] Failed to connect to peer: Bad state: NetworkHandler not available
2026-02-02T15:34:43.768118 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:43.769116 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:43.769116 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:43.769116 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:14 +387: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:14 +387: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:43.774117 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:43.775116 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:43.775116 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:43.775116 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:43.776115 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:43.776115 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:43.776115 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:43.777115 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:43.777115 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:43.777115 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:43.777115 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:14 +388: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:14 +388: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:43.782113 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:43.788469 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:43.788469 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:43.789486 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:43.789486 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:43.789486 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:43.790486 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:43.792485 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:43.793485 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:43.793485 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:43.793485 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:14 +389: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:14 +389: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:43.799989 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:43.800992 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:43.800992 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:43.801991 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:43.803988 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:43.803988 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:43.804989 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:43.805988 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:43.805988 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:43.805988 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:43.806989 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:14 +390: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:14 +390: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:43.812986 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:43.813985 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:43.813985 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:43.814987 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:43.814987 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:43.814987 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:43.814987 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:43.815985 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:43.815985 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:43.815985 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:43.815985 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:14 +391: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:14 +391: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:43.839819 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:43.839819 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:43.839819 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:43.841324 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:43.841324 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:43.841324 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:43.841324 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:43.846033 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:43.846033 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:43.847537 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:43.847537 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:14 +392: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:14 +392: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:43.852540 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:43.853541 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:43.853541 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:43.854540 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:43.854540 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:43.854540 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:43.854540 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:43.856539 [SEVERE] [IPFSNode] [ERROR] Failed to resolve IPNS: Exception: Service not registered: DHTHandler
2026-02-02T15:34:43.856539 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:43.856539 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:43.857539 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:43.857539 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:14 +393: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:14 +393: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:43.863537 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:43.863537 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:43.864537 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:43.864537 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:43.864537 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:43.864537 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:43.864537 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:43.865536 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:43.865536 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:43.865536 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:43.865536 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
2026-02-02T15:34:43.866536 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:43.867536 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:43.867536 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:43.867536 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:14 +394: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:14 +394: test\core\ipfs_node_test.dart: IPFSNode Offline Tests should initialize and start in offline mode
2026-02-02T15:34:44.012186 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:44.013186 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:44.013186 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:44.013186 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:44.013186 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:44.013186 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:44.013186 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:44.014186 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:44.014186 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:44.014186 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:44.014186 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:14 +395: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:15 +395: test\core\ipfs_test.dart: IPFS Facade should start and stop successfully
2026-02-02T15:34:44.661585 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:44.705827 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:44.710408 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:44.769186 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./test_tmp/ipfs_facade_1770068084615
2026-02-02T15:34:44.770185 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:44.770185 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:44.771184 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:44.772690 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:44.777762 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:44.777762 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:44.790995 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:34:44.791998 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:44.791998 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:15 +396: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:15 +396: test\core\ipfs_test.dart: IPFS Facade should start and stop successfully
2026-02-02T15:34:44.795997 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:44.796997 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:44.797997 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:44.817331 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./test_tmp/ipfs_facade_1770068084793
2026-02-02T15:34:44.817839 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:44.818851 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:44.818851 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:44.819850 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:44.884388 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:44.884388 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:44.892360 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:34:44.892360 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:44.893874 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:15 +397: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:15 +397: test\core\ipfs_test.dart: IPFS Facade should start and stop successfully
2026-02-02T15:34:44.896248 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:44.896248 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:44.897767 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:44.925691 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./test_tmp/ipfs_facade_1770068084894
2026-02-02T15:34:44.925691 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:44.925691 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:44.925691 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:44.926702 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:45.001726 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:45.002736 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:45.009243 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:34:45.009243 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:45.009243 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:15 +398: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:15 +398: test\core\ipfs_test.dart: IPFS Facade should start and stop successfully
2026-02-02T15:34:45.012130 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:45.014130 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:45.014635 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:45.054447 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./test_tmp/ipfs_facade_1770068085011
2026-02-02T15:34:45.055952 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:45.055952 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:45.055952 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:45.055952 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:45.082952 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:45.084466 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:45.098369 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:34:45.098369 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:45.099370 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:15 +399: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:15 +399: test\core\ipfs_test.dart: IPFS Facade should start and stop successfully
2026-02-02T15:34:45.102568 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:45.103566 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:45.103566 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:45.126904 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./test_tmp/ipfs_facade_1770068085101
2026-02-02T15:34:45.126904 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:45.126904 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:45.127905 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:45.127905 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:45.132890 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:45.132890 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:45.142853 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:34:45.143867 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:45.144416 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:15 +400: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:15 +400: test\core\ipfs_test.dart: IPFS Facade should start and stop successfully
2026-02-02T15:34:45.147438 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:45.147438 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:45.147438 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:34:45.165918 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./test_tmp/ipfs_facade_1770068085145
2026-02-02T15:34:45.165918 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:34:45.167429 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:34:45.167429 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:34:45.167429 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:34:45.175458 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:34:45.175458 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:34:45.179461 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:34:45.180462 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:45.180462 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:15 +401: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management getPublicKey returns null for missing key
00:15 +402: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:16 +403: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:16 +404: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:16 +405: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:16 +406: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:16 +407: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:16 +408: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:16 +409: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:16 +410: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:16 +411: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:16 +412: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:16 +413: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:16 +414: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:16 +415: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:16 +416: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:17 +417: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:17 +418: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:17 +419: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management removeKey removes key
00:17 +420: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:17 +421: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:17 +422: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:17 +423: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:17 +424: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:17 +425: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:17 +426: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:17 +427: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:17 +428: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:17 +429: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:17 +430: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:17 +431: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:17 +432: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:18 +433: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:18 +434: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:18 +435: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:18 +436: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:18 +437: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:18 +438: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:18 +439: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:18 +440: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:18 +441: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:18 +442: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:18 +443: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:18 +444: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:18 +445: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:18 +446: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Key Management keyNames lists all keys
00:18 +447: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:19 +448: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:19 +449: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:19 +450: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:19 +451: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:19 +452: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:19 +453: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:19 +454: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:19 +455: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:19 +456: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:19 +457: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:19 +458: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:19 +459: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:19 +460: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:19 +461: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:19 +462: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:20 +463: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:20 +464: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:20 +464: test\core\ipld_handler_test.dart: IPLDHandler should put and get DAG-JSON data with links
DEBUG: Generated DAG-JSON: {"link":{"/":"bbkujcaa4qlddpfqgljewfgoykjuko656mb54kxtgo2uuh3bfbuiarz64b"}}
00:20 +465: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:20 +466: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:20 +466: test\core\ipld_handler_test.dart: IPLDHandler should put and get DAG-CBOR data
2026-02-02T15:34:49.367722 [SEVERE] [IPLDHandler] [ERROR] Failed to put IPLD data
Error: Unsupported operation: Unsupported codec: unknown-codec
Stack trace: null
00:20 +467: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed stores seed successfully
00:20 +468: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed throws for invalid seed length
00:20 +469: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed throws for invalid seed length
00:20 +470: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed throws for invalid seed length
00:20 +471: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed throws for invalid seed length
00:20 +472: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed throws for invalid seed length
00:20 +473: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed throws for invalid seed length
00:20 +474: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed throws for invalid seed length
00:20 +475: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed throws for invalid seed length
00:20 +476: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed throws for invalid seed length
00:20 +477: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed throws for invalid seed length
00:21 +477: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:34:50.459127 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:50.486662 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:21 +478: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed throws for invalid seed length
00:21 +478: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:34:50.527384 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:50.530205 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:50.531210 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:50.531210 [INFO] [MetricsCollector] [INFO] Metrics collection disabled in config
2026-02-02T15:34:50.535244 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:34:50.536243 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:21 +479: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed throws for invalid seed length
00:21 +479: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:34:50.542748 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:50.570125 [FINE] [MetricsCollector] [VERBOSE] Recorded protocol metrics for bitswap
2026-02-02T15:34:50.571125 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:21 +480: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed throws for invalid seed length
00:21 +480: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:34:50.579167 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:50.581166 [FINE] [MetricsCollector] [VERBOSE] Recorded error for bitswap: timeout
2026-02-02T15:34:50.581166 [FINE] [MetricsCollector] [VERBOSE] Recorded error for bitswap: timeout
2026-02-02T15:34:50.581166 [FINE] [MetricsCollector] [VERBOSE] Recorded error for bitswap: invalid_msg
2026-02-02T15:34:50.582166 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:21 +481: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed throws for invalid seed length
00:21 +481: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:34:50.584864 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:50.592909 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:21 +482: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed throws for invalid seed length
00:21 +482: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:34:50.623078 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:50.628587 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:21 +483: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore importSeed importSeed throws for invalid seed length
00:21 +483: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:34:50.631164 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:50.632179 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:50.634177 [INFO] [MetricsCollector] [INFO] Metrics collection started
00:21 +484: test\core\metrics\metrics_collector_test.dart: MetricsCollector metricsStream emits data
00:22 +484: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:34:51.654998 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:22 +485: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:22 +485: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:34:51.661014 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:51.661014 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:22 +486: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:22 +486: test\core\metrics\metrics_collector_test.dart: MetricsCollector should initialize with correct status
2026-02-02T15:34:51.665527 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:51.668835 [FINE] [MetricsCollector] [VERBOSE] Recorded protocol metrics for invalid
2026-02-02T15:34:51.669838 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:22 +487: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey retrieves decryptable key
00:22 +487: test\core\metrics_test.dart: MetricsCollector should initialize and start/stop
2026-02-02T15:34:51.968047 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:51.986506 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:51.989014 [INFO] [MetricsCollector] [INFO] Metrics collection started
00:22 +488: test\core\metrics_test.dart: MetricsCollector should initialize and start/stop
2026-02-02T15:34:51.994039 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:22 +489: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:22 +489: test\core\metrics_test.dart: MetricsCollector should initialize and start/stop
2026-02-02T15:34:52.011389 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:52.024559 [FINE] [MetricsCollector] [VERBOSE] Recorded protocol metrics for bitswap
00:22 +490: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:22 +490: test\core\metrics_test.dart: MetricsCollector should initialize and start/stop
2026-02-02T15:34:52.031579 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
00:22 +491: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:22 +491: test\core\metrics_test.dart: MetricsCollector should initialize and start/stop
2026-02-02T15:34:52.051900 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
00:22 +492: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:22 +492: test\core\metrics_test.dart: MetricsCollector should initialize and start/stop
2026-02-02T15:34:52.058599 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:52.063298 [FINE] [MetricsCollector] [VERBOSE] Recorded error for lookup: timeout
00:22 +493: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:22 +493: test\core\metrics_test.dart: MetricsCollector should initialize and start/stop
2026-02-02T15:34:52.065321 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:52.067325 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:34:52.067325 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:34:52.067325 [INFO] [MetricsCollector] [INFO] Metrics collection disabled in config
2026-02-02T15:34:52.067325 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
00:22 +494: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +495: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +496: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +497: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +498: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +499: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +500: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +501: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +502: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +503: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +504: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +505: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +506: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +507: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +508: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +509: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +510: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +511: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +512: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +513: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +514: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +515: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:23 +516: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore getKey getKey throws for missing key
00:24 +517: test\core\security\security_manager_test.dart: SecurityManager should unlock keystore with password
00:25 +517: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:34:54.321264 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
00:25 +518: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization serialize produces valid JSON
00:25 +519: test\core\security\security_manager_test.dart: SecurityManager should lock keystore
00:26 +519: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:34:55.373363 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
2026-02-02T15:34:55.374869 [INFO] [SecurityManager] [INFO] Encrypted keystore locked
00:26 +520: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:26 +521: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:26 +522: test\core\crypto\encrypted_keystore_test.dart: EncryptedKeystore Serialization deserialize restores keystore
00:26 +523: test\core\security\security_manager_test.dart: SecurityManager should generate secure key when unlocked
00:26 +524: test\core\security\security_manager_test.dart: SecurityManager should generate secure key when unlocked
00:26 +525: test\core\security\security_manager_test.dart: SecurityManager should generate secure key when unlocked
00:26 +526: test\core\security\security_manager_test.dart: SecurityManager should generate secure key when unlocked
00:27 +526: test\core\security\security_manager_web_test.dart: SecurityManagerWeb should start locked
2026-02-02T15:34:56.620051 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
00:27 +527: test\core\security\security_manager_test.dart: SecurityManager should generate secure key when unlocked
00:27 +527: test\core\security\security_manager_web_test.dart: SecurityManagerWeb should start locked
2026-02-02T15:34:56.670779 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
00:27 +527: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:34:57.029910 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
2026-02-02T15:34:57.155711 [INFO] [SecurityManager] [INFO] Generated secure key: test_key
00:27 +528: test\core\security\security_manager_web_test.dart: SecurityManagerWeb should unlock with password
00:28 +529: test\core\security\security_manager_test.dart: SecurityManager getSecureKey - success
00:28 +529: test\core\security\security_manager_web_test.dart: SecurityManagerWeb should start locked
2026-02-02T15:34:57.939656 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
00:29 +529: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:34:58.441914 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
2026-02-02T15:34:58.451251 [INFO] [SecurityManager] [INFO] Generated secure key: test_key
00:29 +530: test\core\security\security_manager_web_test.dart: SecurityManagerWeb should generate and retrieve secure keys
00:29 +531: test\core\security\security_manager_web_test.dart: SecurityManagerWeb should generate and retrieve secure keys
00:29 +531: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:34:58.473491 [INFO] [Keystore] [INFO] Added key pair for legacy_key.
00:30 +532: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - success
00:30 +532: test\core\security\security_manager_web_test.dart: SecurityManagerWeb should start locked
2026-02-02T15:34:59.232490 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
00:30 +532: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:34:59.852203 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
2026-02-02T15:34:59.854296 [WARNING] [Keystore] [WARNING] Exporting plaintext keys for migration - ensure they are encrypted!
2026-02-02T15:34:59.858932 [INFO] [SecurityManager] [INFO] Migrating 1 keys to encrypted storage
2026-02-02T15:34:59.865264 [INFO] [Keystore] [INFO] Plaintext keystore cleared after migration
2026-02-02T15:34:59.866264 [INFO] [SecurityManager] [INFO] Successfully migrated 1 keys
00:30 +533: test\core\security\security_manager_web_test.dart: SecurityManagerWeb should lock and clear keys
00:31 +534: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - empty
00:31 +535: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - empty
00:31 +536: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - empty
00:31 +537: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - empty
00:31 +538: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - empty
00:32 +538: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:35:01.320395 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
2026-02-02T15:35:01.320395 [WARNING] [Keystore] [WARNING] Exporting plaintext keys for migration - ensure they are encrypted!
2026-02-02T15:35:01.321394 [INFO] [SecurityManager] [INFO] No plaintext keys to migrate
00:32 +539: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:32 +540: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:32 +541: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:32 +542: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:32 +543: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:32 +544: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:32 +545: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:32 +546: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:32 +547: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:32 +547 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:32 +547 -1: test\core\storage\datastore_test.dart: Datastore Config FlatFileDatastore query prefix [E]
  Expected: true
    Actual: <false>
  
  package:matcher                             expect
  test\core\storage\datastore_test.dart 77:7  verifyDatastore.<fn>.<fn>
  
00:32 +548 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:33 +549 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:33 +550 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:33 +551 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:33 +552 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:33 +553 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:33 +554 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:33 +555 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:33 +556 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:33 +557 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:33 +558 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:33 +559 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:33 +560 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:33 +561 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:34 +562 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:34 +563 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:34 +564 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - skip existing
00:34 +564 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:35:03.385729 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
2026-02-02T15:35:03.391631 [INFO] [SecurityManager] [INFO] Generated secure key: existing_key
2026-02-02T15:35:03.391631 [INFO] [Keystore] [INFO] Added key pair for existing_key.
2026-02-02T15:35:03.393141 [WARNING] [Keystore] [WARNING] Exporting plaintext keys for migration - ensure they are encrypted!
2026-02-02T15:35:03.393141 [INFO] [SecurityManager] [INFO] Migrating 1 keys to encrypted storage
00:34 +565 -1: test\core\security\security_manager_test.dart: SecurityManager migrateKeysFromPlaintext - locked error
00:34 +566 -1: test\core\security\security_manager_test.dart: SecurityManager TLS initialization error - missing paths
00:34 +566 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:35:03.402481 [SEVERE] [SecurityManager] [ERROR] Failed to initialize SecurityManager
Error: Bad state: TLS enabled but certificate or private key path not provided
Stack trace: #0      SecurityManager._initializeTLS (package:dart_ipfs/src/core/security/security_manager.dart:188:7)
#1      SecurityManager._initializeSecurity (package:dart_ipfs/src/core/security/security_manager.dart:169:9)
#2      new SecurityManager (package:dart_ipfs/src/core/security/security_manager.dart:26:5)
#3      main.<anonymous closure>.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/core/security/security_manager_test.dart:187:20)
#4      Throws.matchAsync (package:matcher/src/expect/throws_matcher.dart:85:37)
#5      _expect (package:matcher/src/expect/expect.dart:137:26)
#6      expect (package:matcher/src/expect/expect.dart:65:3)
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/core/security/security_manager_test.dart:187:7)
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:25)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:34 +567 -1: test\core\security\security_manager_test.dart: SecurityManager TLS initialization error - missing cert
00:34 +567 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:35:03.415689 [SEVERE] [SecurityManager] [ERROR] Failed to initialize SecurityManager
Error: FileSystemException: TLS certificate file not found, path = 'non_existent_cert'
Stack trace: #0      SecurityManager._initializeTLS (package:dart_ipfs/src/core/security/security_manager.dart:195:7)
#1      SecurityManager._initializeSecurity (package:dart_ipfs/src/core/security/security_manager.dart:169:9)
#2      new SecurityManager (package:dart_ipfs/src/core/security/security_manager.dart:26:5)
#3      main.<anonymous closure>.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/core/security/security_manager_test.dart:197:15)
#4      Throws.matchAsync (package:matcher/src/expect/throws_matcher.dart:85:37)
#5      _expect (package:matcher/src/expect/expect.dart:137:26)
#6      expect (package:matcher/src/expect/expect.dart:65:3)
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/core/security/security_manager_test.dart:196:7)
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:25)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:34 +568 -1: test\core\security\security_manager_test.dart: SecurityManager TLS initialization error - cert exists but key missing
00:34 +568 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:35:03.425129 [SEVERE] [SecurityManager] [ERROR] Failed to initialize SecurityManager
Error: FileSystemException: TLS private key file not found, path = 'non_existent_key'
Stack trace: #0      SecurityManager._initializeTLS (package:dart_ipfs/src/core/security/security_manager.dart:202:7)
#1      SecurityManager._initializeSecurity (package:dart_ipfs/src/core/security/security_manager.dart:169:9)
#2      new SecurityManager (package:dart_ipfs/src/core/security/security_manager.dart:26:5)
#3      main.<anonymous closure>.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/core/security/security_manager_test.dart:214:17)
#4      Throws.matchAsync (package:matcher/src/expect/throws_matcher.dart:85:37)
#5      _expect (package:matcher/src/expect/expect.dart:137:26)
#6      expect (package:matcher/src/expect/expect.dart:65:3)
#7      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/core/security/security_manager_test.dart:213:9)
#8      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:25)
<asynchronous suspension>
#9      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#10     Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:34 +569 -1: test\core\security\security_manager_test.dart: SecurityManager Key rotation execution
00:34 +570 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey - key not found fallback
00:34 +570 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:35:03.472111 [WARNING] [SecurityManager] [WARNING] Key not found in any keystore: non_existent
00:34 +571 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - secure key
00:34 +572 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - secure key
00:34 +573 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - secure key
00:34 +574 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - secure key
00:34 +575 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - secure key
00:35 +575 -1: test\core\unixfs\unixfs_test.dart: UnixFS File Sharding should shard large file into multiple blocks
DEBUG: Generated 6 blocks for 1150976 bytes
00:35 +576 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - secure key
00:35 +577 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - secure key
00:35 +577 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:35:04.833447 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
2026-02-02T15:35:04.843249 [INFO] [SecurityManager] [INFO] Generated secure key: secure_key
00:35 +578 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - plaintext key
00:35 +578 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:35:04.933244 [INFO] [Keystore] [INFO] Added key pair for legacy_key.
2026-02-02T15:35:04.933244 [WARNING] [SecurityManager] [WARNING] Retrieved PLAINTEXT key for legacy_key - migration recommended (SEC-008)
00:35 +579 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - locked warning
00:35 +580 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - locked warning
00:35 +581 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - locked warning
00:35 +582 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - locked warning
00:35 +583 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - locked warning
00:35 +584 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - locked warning
00:35 +585 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - locked warning
00:35 +586 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - locked warning
00:35 +587 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - locked warning
00:35 +588 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - locked warning
00:35 +589 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - locked warning
00:35 +590 -1: test\core\security\security_manager_test.dart: SecurityManager getPrivateKey fallback - locked warning
00:36 +590 -1: test\e2e\e2e_test.dart: E2E IPFSNode Lifecycle Node starts, initializes components, and stops cleanly
2026-02-02T15:35:05.496231 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:35:05.511425 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:35:05.512426 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:35:05.513426 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:35:05.514534 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:35:05.515039 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:35:05.515039 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:35:05.516358 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:05.517362 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:05.619877 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:05.620875 [FINE] [NetworkHandler] [VERBOSE] Router initialized successfully
2026-02-02T15:35:05.620875 [FINE] [NetworkHandler] [VERBOSE] Setting up network event handlers
2026-02-02T15:35:05.620875 [FINE] [NetworkHandler] [VERBOSE] Event handlers configured
2026-02-02T15:35:05.622380 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:35:05.624493 [FINE] [MDNSHandler] [DEBUG] MDNSHandler instance created
2026-02-02T15:35:05.682415 [FINE] [Libp2pRouter] [DEBUG] Registered protocol pubsub
2026-02-02T15:35:05.684923 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:35:05.685927 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:35:05.685927 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/bitswap/1.2.0
2026-02-02T15:35:05.686926 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:35:05.686926 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/bitswap/1.2.0
2026-02-02T15:35:05.687927 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:35:05.687927 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:35:05.687927 [FINE] [BootstrapHandler] [DEBUG] Creating new BootstrapHandler instance
2026-02-02T15:35:05.690172 [FINE] [ContentRoutingHandler] [DEBUG] ContentRoutingHandler instance created
2026-02-02T15:35:05.692085 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler instance created
2026-02-02T15:35:05.693605 [FINE] [AutoNATHandler] [DEBUG] AutoNATHandler instance created
2026-02-02T15:35:05.693605 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:05.700821 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:35:05.702134 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:35:05.770051 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at C:\Users\Eduardo\AppData\Local\Temp\ipfs_e2e_test_3a4755a0\datastore
2026-02-02T15:35:05.771119 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at C:\Users\Eduardo\AppData\Local\Temp\ipfs_e2e_test_3a4755a0\datastore
2026-02-02T15:35:05.771119 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:35:05.771119 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:35:05.771119 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:35:05.772624 [FINE] [NetworkHandler] [DEBUG] Starting network services...
2026-02-02T15:35:05.773923 [FINE] [NetworkHandler] [VERBOSE] Initializing router...
2026-02-02T15:35:05.775593 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:05.783677 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:05.802619 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:05.859094 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:05.860155 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - Initial _network.listenAddresses: []
2026-02-02T15:35:05.875410 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G, Host hashCode: 241720899
2026-02-02T15:35:05.878414 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:05.881412 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:05.881412 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:05.882413 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:05.883412 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:05.899225 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:35:05.908136 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:35:05.908136 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:05.909139 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:05.909139 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:05.910469 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:05.910469 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:05.910469 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:05.912737 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:05.913736 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:05.914241 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:05.916265 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:35:05.917284 [INFO] [Config] [Config.newNode] for peer 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G: Host created. Listening will be handled by host.start().
2026-02-02T15:35:05.921758 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:05.921758 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G, network.hashCode: 551156046, initial network.listenAddresses: []
2026-02-02T15:35:05.921758 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:35:05.921758 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/0]. Attempting to listen via _network.listen().
2026-02-02T15:35:05.922756 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:35:05.924263 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/0] for peer 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:05.924263 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:35:05.925263 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/0 for peer 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:05.925769 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/0 with transport TCPTransport for peer 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:05.926096 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/0 with transport TCPTransport
2026-02-02T15:35:05.950543 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/0. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/58616 for peer 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:05.951542 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/0 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/58616
2026-02-02T15:35:05.951542 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/58616. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58616] for peer 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:05.952542 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:05.952848 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/58616 for peer 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G. This should be resolved to concrete addresses by the host.
2026-02-02T15:35:05.954352 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:05.956039 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/58616
2026-02-02T15:35:05.956039 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G.
2026-02-02T15:35:05.957042 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:05.957547 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:05.958066 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:05.958066 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:05.958066 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:05.958066 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:05.959082 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:05.959082 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:05.960082 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:05.967526 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:05.967526 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:05.969556 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58616
2026-02-02T15:35:05.969556 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58616
2026-02-02T15:35:05.971039 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:05.971039 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:05.971039 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:05.972544 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - resolvedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:05.972544 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:05.972544 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:05.974062 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - Returning: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616]
2026-02-02T15:35:06.038222 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:06.039727 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.039727 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 551156046, network.listenAddresses: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.053982 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:06.053982 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G, Host hashCode: 241720899
2026-02-02T15:35:06.053982 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.055656 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.055656 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.056172 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.056172 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58616
2026-02-02T15:35:06.056172 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58616
2026-02-02T15:35:06.056172 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.057686 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.057686 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.057686 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - resolvedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.058690 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.058690 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.059194 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - Returning: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616]
2026-02-02T15:35:06.059194 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:06.059194 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:06.060580 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:06.060580 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G, Host hashCode: 241720899
2026-02-02T15:35:06.060580 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.061646 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.061646 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.062647 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.062647 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58616
2026-02-02T15:35:06.063155 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58616
2026-02-02T15:35:06.063155 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.063659 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.063659 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.063659 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - resolvedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.064680 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.064680 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.064680 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - Returning: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616]
2026-02-02T15:35:06.064680 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:06.067679 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:06.067679 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:06.069183 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:06.070552 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.070552 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 551156046, network.listenAddresses: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.070552 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.070552 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 551156046, network.listenAddresses: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.072585 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:06.073850 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:06.073850 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G, Host hashCode: 241720899
2026-02-02T15:35:06.075353 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.075872 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.075872 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.076395 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.076395 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58616
2026-02-02T15:35:06.076395 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58616
2026-02-02T15:35:06.076395 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.076395 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.076395 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.076395 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - resolvedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.077899 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.077899 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.077899 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - Returning: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616]
2026-02-02T15:35:06.078903 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:06.079409 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:06.080874 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.080874 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 551156046, network.listenAddresses: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.080874 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:06.081879 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.081879 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 551156046, network.listenAddresses: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.083402 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:35:06.083402 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:06.084401 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/0 with ID: 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:06.085411 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:06.087829 [FINE] [NetworkHandler] [VERBOSE] Router started successfully
2026-02-02T15:35:06.087829 [FINE] [NetworkHandler] [VERBOSE] Initializing circuit relay client...
2026-02-02T15:35:06.087829 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already started
2026-02-02T15:35:06.091937 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /libp2p/circuit/relay/0.2.0/hop
2026-02-02T15:35:06.092442 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /libp2p/circuit/relay/0.2.0/hop
2026-02-02T15:35:06.093136 [FINE] [NetworkHandler] [VERBOSE] Circuit relay client started successfully
2026-02-02T15:35:06.093136 [FINE] [NetworkHandler] [VERBOSE] Registering AutoNAT dialback protocol handler
2026-02-02T15:35:06.093136 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/autonat/1.0.0/dialback
2026-02-02T15:35:06.093136 [FINE] [NetworkHandler] [DEBUG] AutoNAT dialback handler registered
2026-02-02T15:35:06.093136 [INFO] [NetworkHandler] [INFO] Network services started successfully
2026-02-02T15:35:06.094640 [FINE] [MDNSHandler] [DEBUG] MDNS disabled by configuration
2026-02-02T15:35:06.095657 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:06.095657 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G, Host hashCode: 241720899
2026-02-02T15:35:06.096657 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.096657 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.097162 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.097668 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.097668 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58616
2026-02-02T15:35:06.097668 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58616
2026-02-02T15:35:06.097668 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.097668 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.097668 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.099184 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - resolvedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.099184 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.099184 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.099184 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - Returning: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616]
2026-02-02T15:35:06.100220 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:06.101534 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already initialized
2026-02-02T15:35:06.102039 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:06.102039 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:06.102039 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:06.102039 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G, Host hashCode: 241720899
2026-02-02T15:35:06.102039 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.103042 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.103042 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.103547 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.103547 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58616
2026-02-02T15:35:06.103547 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58616
2026-02-02T15:35:06.103547 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.104551 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.104551 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.104551 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - resolvedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.104551 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.105555 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.105555 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - Returning: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616]
2026-02-02T15:35:06.106060 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:06.106060 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already started
2026-02-02T15:35:06.112197 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/kad/1.0.0
2026-02-02T15:35:06.113198 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/kad/1.0.0
2026-02-02T15:35:06.113703 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already started
2026-02-02T15:35:06.114470 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:06.114978 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G, Host hashCode: 241720899
2026-02-02T15:35:06.114978 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.114978 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.114978 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.114978 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.116494 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58616
2026-02-02T15:35:06.116494 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58616
2026-02-02T15:35:06.116494 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.116494 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.116494 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.117512 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - resolvedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.117512 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.117512 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.117512 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - Returning: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616]
2026-02-02T15:35:06.118511 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:06.118511 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/kad/1.0.0
2026-02-02T15:35:06.119541 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for pubsub
2026-02-02T15:35:06.120664 [INFO] [PubSubClient] [INFO] PubSub client started with peer ID: 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:06.122057 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:35:06.122057 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:06.123056 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:06.123056 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G, Host hashCode: 241720899
2026-02-02T15:35:06.123562 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.123562 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.123562 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.123562 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.123562 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58616
2026-02-02T15:35:06.123562 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58616
2026-02-02T15:35:06.123562 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.125066 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.125066 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.125066 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - resolvedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.125583 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.125583 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.125583 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - Returning: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616]
2026-02-02T15:35:06.125583 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:06.126588 [FINE] [BitswapHandler] [DEBUG] Starting BitswapHandler...
2026-02-02T15:35:06.126588 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already initialized
2026-02-02T15:35:06.126588 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:06.126588 [FINE] [BitswapHandler] [VERBOSE] Router initialized
2026-02-02T15:35:06.126588 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already started
2026-02-02T15:35:06.127953 [FINE] [BitswapHandler] [VERBOSE] Router started
2026-02-02T15:35:06.128982 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/bitswap/1.2.0
2026-02-02T15:35:06.128982 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:35:06.128982 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/bitswap/1.2.0
2026-02-02T15:35:06.128982 [INFO] [BitswapHandler] [INFO] BitswapHandler started successfully
2026-02-02T15:35:06.130005 [FINE] [ContentRoutingHandler] [DEBUG] Starting ContentRoutingHandler...
2026-02-02T15:35:06.130005 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already initialized
2026-02-02T15:35:06.130005 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:06.130005 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G, Host hashCode: 241720899
2026-02-02T15:35:06.131882 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.131882 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.131882 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.131882 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.132900 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58616
2026-02-02T15:35:06.132900 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58616
2026-02-02T15:35:06.132900 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.132900 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.132900 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.132900 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - resolvedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.133938 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.133938 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.133938 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - Returning: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616]
2026-02-02T15:35:06.133938 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:06.133938 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already started
2026-02-02T15:35:06.134939 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=4, addrs=2, protocols=8
2026-02-02T15:35:06.134939 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:06.135444 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/kad/1.0.0
2026-02-02T15:35:06.136535 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/kad/1.0.0
2026-02-02T15:35:06.136535 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:06.136535 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:06.136535 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G, Host hashCode: 241720899
2026-02-02T15:35:06.136535 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.136535 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.136535 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.138853 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.138853 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58616
2026-02-02T15:35:06.138853 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58616
2026-02-02T15:35:06.139857 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.139857 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.139857 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.140361 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - resolvedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.140361 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.140865 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.140865 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - Returning: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616]
2026-02-02T15:35:06.140865 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:06.140865 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already started
2026-02-02T15:35:06.141871 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/kad/1.0.0
2026-02-02T15:35:06.142375 [INFO] [ContentRouting] [INFO] Content routing started.
2026-02-02T15:35:06.142375 [FINE] [ContentRoutingHandler] [VERBOSE] DHT-based content routing started
2026-02-02T15:35:06.142375 [FINE] [ContentRoutingHandler] [DEBUG] ContentRoutingHandler started successfully
2026-02-02T15:35:06.142375 [FINE] [DNSLinkHandler] [DEBUG] Starting DNSLinkHandler...
2026-02-02T15:35:06.143389 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler started successfully
2026-02-02T15:35:06.143389 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:06.143389 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:06.144389 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/graphsync/1.0.0
2026-02-02T15:35:06.144893 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/graphsync/1.0.0
2026-02-02T15:35:06.144893 [FINE] [GraphsyncHandler] [DEBUG] Starting GraphsyncHandler...
2026-02-02T15:35:06.144893 [FINE] [GraphsyncHandler] [DEBUG] GraphsyncHandler started successfully
2026-02-02T15:35:06.145900 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:06.145900 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G, Host hashCode: 241720899
2026-02-02T15:35:06.145900 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.145900 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.146905 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.146905 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.147411 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58616
2026-02-02T15:35:06.147411 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58616 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58616
2026-02-02T15:35:06.147411 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58616]
2026-02-02T15:35:06.147411 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58616 (first component not IP)
2026-02-02T15:35:06.148427 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:06.148427 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - resolvedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.148427 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.149427 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616}
2026-02-02T15:35:06.149427 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G - Returning: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616]
2026-02-02T15:35:06.149427 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58616, /ip4/172.29.112.1/tcp/58616] for host 12D3KooWHW12hQp51hmebFcJFxfwtdT1ra2gLbaashWSRzyNiA5G
2026-02-02T15:35:06.150427 [FINE] [AutoNATHandler] [DEBUG] Starting AutoNATHandler...
2026-02-02T15:35:06.150427 [FINE] [AutoNATHandler] [DEBUG] Detecting NAT type...
2026-02-02T15:35:06.151427 [FINE] [AutoNATHandler] [DEBUG] NAT type detected: NATType.restricted
2026-02-02T15:35:06.152426 [INFO] [AutoNATHandler] [INFO] NAT detected but port mapping is disabled in config
2026-02-02T15:35:06.152426 [FINE] [AutoNATHandler] [VERBOSE] Starting periodic dialback tests
2026-02-02T15:35:06.153427 [FINE] [AutoNATHandler] [VERBOSE] Performing dialback test
2026-02-02T15:35:06.153427 [FINE] [NetworkHandler] [VERBOSE] Starting dialback test
2026-02-02T15:35:06.153427 [FINE] [NetworkHandler] [DEBUG] No bootstrap peers available for dialback test
2026-02-02T15:35:06.154425 [FINE] [AutoNATHandler] [DEBUG] Dialback test complete. Reachable: false
2026-02-02T15:35:06.154425 [INFO] [AutoNATHandler] [INFO] AutoNATHandler started successfully
2026-02-02T15:35:06.155426 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:35:06.155426 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=5, addrs=2, protocols=9
2026-02-02T15:35:06.155426 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:06.156424 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already started
2026-02-02T15:35:06.156424 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:06.156424 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/kad/1.0.0
2026-02-02T15:35:06.156424 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:35:06.156424 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /ipfs/ipns-1.0.0
2026-02-02T15:35:06.157930 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:35:06.158949 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:35:06.170551 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=6, addrs=2, protocols=10
2026-02-02T15:35:06.170551 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:06.181958 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:06.188075 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=7, addrs=2, protocols=11
2026-02-02T15:35:06.188075 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:06.189085 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:06.189591 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:06.189591 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:06.189591 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=8, addrs=2, protocols=12
2026-02-02T15:35:06.189591 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:06.189591 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:06.211322 [FINE] [Libp2pRouter] [DEBUG] Removed protocol handler for /ipfs/ipns-1.0.0
2026-02-02T15:35:06.212322 [INFO] [IPNSHandler] [INFO] IPNS handler stopped successfully
2026-02-02T15:35:06.213322 [FINE] [AutoNATHandler] [DEBUG] Stopping AutoNATHandler...
2026-02-02T15:35:06.214831 [INFO] [NatTraversalService] [INFO] Removing port mappings for port 4001...
2026-02-02T15:35:06.214831 [INFO] [AutoNATHandler] [INFO] AutoNATHandler stopped successfully
2026-02-02T15:35:06.216108 [FINE] [GraphsyncHandler] [DEBUG] Stopping GraphsyncHandler...
2026-02-02T15:35:06.216108 [FINE] [GraphsyncHandler] [DEBUG] GraphsyncHandler stopped successfully
2026-02-02T15:35:06.216108 [FINE] [DNSLinkHandler] [DEBUG] Stopping DNSLinkHandler...
2026-02-02T15:35:06.217108 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler stopped successfully
2026-02-02T15:35:06.217108 [FINE] [ContentRoutingHandler] [DEBUG] Stopping ContentRoutingHandler...
2026-02-02T15:35:06.218107 [INFO] [ContentRouting] [INFO] Content routing stopped.
2026-02-02T15:35:06.218107 [FINE] [ContentRoutingHandler] [VERBOSE] DHT-based content routing stopped
2026-02-02T15:35:06.219107 [FINE] [ContentRoutingHandler] [DEBUG] ContentRoutingHandler stopped successfully
2026-02-02T15:35:06.220106 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:06.221220 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:06.221220 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:06.222725 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:06.222725 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:06.223833 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:35:06.230143 [INFO] [PubSubClient] [INFO] PubSub client stopped.
2026-02-02T15:35:06.232963 [WARNING] [BootstrapHandler] [WARNING] BootstrapHandler already stopped
2026-02-02T15:35:06.234996 [WARNING] [MDNSHandler] [WARNING] MDNSHandler already stopped
2026-02-02T15:35:06.236 [FINE] [NetworkHandler] [DEBUG] Stopping network services...
2026-02-02T15:35:06.236507 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already stopped
2026-02-02T15:35:06.238598 [FINE] [NetworkHandler] [VERBOSE] Circuit relay client stopped
2026-02-02T15:35:06.238598 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already stopped
2026-02-02T15:35:06.238598 [FINE] [NetworkHandler] [VERBOSE] Router stopped
2026-02-02T15:35:06.240102 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:06.240102 [FINE] [NetworkHandler] [VERBOSE] Network event subscriptions canceled
2026-02-02T15:35:06.240102 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:06.240102 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:06.241107 [FINE] [NetworkHandler] [VERBOSE] Network event controller closed
2026-02-02T15:35:06.241107 [INFO] [NetworkHandler] [INFO] Network services stopped successfully
2026-02-02T15:35:06.241613 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:35:06.241613 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:35:06.241613 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:06.242118 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
00:37 +590 -1: test\core\security\security_manager_test.dart: SecurityManager should initialize with locked keystore
2026-02-02T15:35:06.390379 [INFO] [SecurityManager] [INFO] Encrypted keystore unlocked
2026-02-02T15:35:06.392494 [INFO] [SecurityManager] [INFO] Generated secure key: secure_key
2026-02-02T15:35:06.392494 [INFO] [SecurityManager] [INFO] Encrypted keystore locked
2026-02-02T15:35:06.394 [WARNING] [SecurityManager] [WARNING] Encrypted key requested but keystore is locked: secure_key
00:37 +591 -1: test\e2e\e2e_test.dart: E2E IPFSNode Lifecycle Node starts, initializes components, and stops cleanly
00:37 +592 -1: test\e2e\e2e_test.dart: E2E IPFSNode Lifecycle Node starts, initializes components, and stops cleanly
2026-02-02T15:35:06.605311 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:35:06.606311 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:35:06.606311 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
2026-02-02T15:35:06.637260 [SEVERE] [DatastoreHandler] [ERROR] Error loading pinned CIDs: Bad state: HiveDatastore not initialized. Call init() first.
2026-02-02T15:35:06.646856 [WARNING] [IPNSHandler] [WARNING] IPNSHandler already stopped
2026-02-02T15:35:06.649371 [WARNING] [AutoNATHandler] [WARNING] AutoNATHandler already stopped
2026-02-02T15:35:06.650363 [FINE] [GraphsyncHandler] [DEBUG] Stopping GraphsyncHandler...
2026-02-02T15:35:06.650363 [FINE] [GraphsyncHandler] [DEBUG] GraphsyncHandler stopped successfully
2026-02-02T15:35:06.660375 [FINE] [DNSLinkHandler] [DEBUG] Stopping DNSLinkHandler...
2026-02-02T15:35:06.661094 [FINE] [DNSLinkHandler] [DEBUG] DNSLinkHandler stopped successfully
2026-02-02T15:35:06.661094 [FINE] [ContentRoutingHandler] [DEBUG] Stopping ContentRoutingHandler...
2026-02-02T15:35:06.663097 [INFO] [ContentRouting] [INFO] Content routing stopped.
2026-02-02T15:35:06.664097 [FINE] [ContentRoutingHandler] [VERBOSE] DHT-based content routing stopped
2026-02-02T15:35:06.664097 [FINE] [ContentRoutingHandler] [DEBUG] ContentRoutingHandler stopped successfully
2026-02-02T15:35:06.664097 [INFO] [PubSubClient] [INFO] PubSub client stopped.
2026-02-02T15:35:06.664097 [WARNING] [BootstrapHandler] [WARNING] BootstrapHandler already stopped
2026-02-02T15:35:06.665097 [WARNING] [MDNSHandler] [WARNING] MDNSHandler already stopped
2026-02-02T15:35:06.665097 [FINE] [NetworkHandler] [DEBUG] Stopping network services...
2026-02-02T15:35:06.665097 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already stopped
2026-02-02T15:35:06.665097 [FINE] [NetworkHandler] [VERBOSE] Circuit relay client stopped
2026-02-02T15:35:06.665097 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already stopped
2026-02-02T15:35:06.665097 [FINE] [NetworkHandler] [VERBOSE] Router stopped
2026-02-02T15:35:06.666097 [FINE] [NetworkHandler] [VERBOSE] Network event subscriptions canceled
2026-02-02T15:35:06.666097 [FINE] [NetworkHandler] [VERBOSE] Network event controller closed
2026-02-02T15:35:06.666097 [INFO] [NetworkHandler] [INFO] Network services stopped successfully
2026-02-02T15:35:06.666097 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:35:06.667097 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:35:06.667097 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:35:06.667978 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:37 +593 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.custom uses the provided URL
2026-02-02T15:35:06.986006 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:35:07.002839 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:35:07.003842 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:35:07.051516 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./ipfs_data
2026-02-02T15:35:07.051516 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:35:07.051516 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:35:07.051516 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:35:07.054043 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:35:07.057041 [INFO] [IPFSNode] [INFO] Switched Gateway Mode to: GatewayMode.custom
00:37 +593 -1: test\integration\full_nat_test.dart: Full NAT Integration Test NetworkHandler.testDialback correctly extracts PeerID from Multiaddr (Fix Verification)
2026-02-02T15:35:07.091191 [FINE] [NetworkHandler] [DEBUG] Initializing NetworkHandler...
2026-02-02T15:35:07.106891 [FINE] [NetworkHandler] [VERBOSE] Creating CircuitRelayClient with router instance
2026-02-02T15:35:07.107895 [FINE] [NetworkHandler] [VERBOSE] Setting up network event listeners
2026-02-02T15:35:07.107895 [FINE] [NetworkHandler] [VERBOSE] Setting up network event stream listener
2026-02-02T15:35:07.107895 [FINE] [NetworkHandler] [DEBUG] NetworkHandler initialization complete
2026-02-02T15:35:07.108978 [FINE] [NetworkHandler] [VERBOSE] Starting dialback test
2026-02-02T15:35:07.113493 [FINE] [NetworkHandler] [DEBUG] Dialback test completed successfully
00:37 +594 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.custom uses the provided URL
00:37 +594 -1: test\integration\full_nat_test.dart: Full NAT Integration Test NetworkHandler.testDialback correctly extracts PeerID from Multiaddr (Fix Verification)
2026-02-02T15:35:07.128501 [FINE] [AutoNATHandler] [DEBUG] AutoNATHandler instance created
2026-02-02T15:35:07.129517 [FINE] [AutoNATHandler] [DEBUG] Starting AutoNATHandler...
2026-02-02T15:35:07.130536 [FINE] [AutoNATHandler] [DEBUG] Detecting NAT type...
2026-02-02T15:35:07.130536 [FINE] [AutoNATHandler] [DEBUG] NAT type detected: NATType.restricted
2026-02-02T15:35:07.132128 [FINE] [AutoNATHandler] [DEBUG] Attempting UPnP/NAT-PMP port mapping...
2026-02-02T15:35:07.133215 [FINE] [AutoNATHandler] [DEBUG] Identified listening port: 5001
2026-02-02T15:35:07.134723 [INFO] [AutoNATHandler] [INFO] Port mapping successful for protocols: TCP, UDP
2026-02-02T15:35:07.135240 [FINE] [AutoNATHandler] [VERBOSE] Performing dialback test
2026-02-02T15:35:07.135785 [FINE] [AutoNATHandler] [DEBUG] Dialback test complete. Reachable: false
2026-02-02T15:35:07.135785 [FINE] [AutoNATHandler] [VERBOSE] Starting periodic dialback tests
2026-02-02T15:35:07.137799 [INFO] [AutoNATHandler] [INFO] AutoNATHandler started successfully
2026-02-02T15:35:07.139811 [FINE] [AutoNATHandler] [DEBUG] Stopping AutoNATHandler...
2026-02-02T15:35:07.140315 [INFO] [AutoNATHandler] [INFO] AutoNATHandler stopped successfully
00:37 +595 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.custom uses the provided URL
2026-02-02T15:35:07.196079 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:35:07.197600 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:35:07.232450 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:35:07.233465 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:35:07.233465 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:38 +596 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +596 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.custom uses the provided URL
2026-02-02T15:35:07.256474 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:35:07.256474 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:35:07.257477 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:35:07.373643 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./ipfs_data
2026-02-02T15:35:07.373643 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:35:07.373643 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:35:07.375149 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:35:07.375149 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:35:07.375669 [INFO] [IPFSNode] [INFO] Switched Gateway Mode to: GatewayMode.internal
00:38 +597 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +598 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +599 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +600 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +601 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +602 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +603 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +604 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +605 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +606 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +607 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +608 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +609 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +610 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +611 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +612 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +613 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +614 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +615 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +616 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +617 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:38 +618 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.internal does NOT use the gateway (for non-existent local content)
00:39 +618 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.custom uses the provided URL
2026-02-02T15:35:08.345202 [WARNING] [HttpGatewayClient] [WARNING] Failed to retrieve CID test_cid from all gateways
2026-02-02T15:35:08.346727 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:35:08.347726 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:35:08.351740 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:35:08.351740 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:35:08.351740 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:39 +619 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:39 +619 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.custom uses the provided URL
2026-02-02T15:35:08.358305 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:35:08.358305 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:35:08.358305 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:35:08.377998 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./ipfs_data
2026-02-02T15:35:08.377998 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:35:08.378998 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:35:08.379998 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:35:08.379998 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
2026-02-02T15:35:08.380998 [INFO] [IPFSNode] [INFO] Switched Gateway Mode to: GatewayMode.public
00:39 +620 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:39 +621 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:39 +622 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:39 +623 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:39 +624 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:39 +625 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:39 +626 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:39 +627 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:39 +628 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:39 +629 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:39 +630 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.public uses default ipfs.io logic (Integration Check)
00:39 +630 -1: test\gateway_selector_test.dart: Gateway Selector Integration GatewayMode.custom uses the provided URL
2026-02-02T15:35:08.962036 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:35:08.962036 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:35:08.969563 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:35:08.969563 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:35:08.970562 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:39 +631 -1: test\mocks\mock_integration_test.dart: Mock Infrastructure Integration MockDHTHandler simulates delays
00:39 +632 -1: test\mocks\mock_integration_test.dart: Mock Infrastructure Integration MockDHTHandler simulates errors
00:39 +633 -1: test\mocks\mock_integration_test.dart: Mock Infrastructure Integration MockDHTHandler resets state correctly
00:39 +634 -1: test\mocks\mock_integration_test.dart: Mock Infrastructure Integration Mock infrastructure works together
00:39 +635 -1: test\mocks\mock_integration_test.dart: Mock Infrastructure Integration Multiple test blocks can be created and stored
00:39 +636 -1: test\mocks\mock_integration_test.dart: Mock Infrastructure Integration InMemoryDatastore pin functionality via key prefix
00:39 +637 -1: test\mocks\mock_integration_test.dart: Test Helpers createTestBlock creates valid blocks
00:39 +638 -1: test\mocks\mock_integration_test.dart: Test Helpers createTestBlocks creates multiple blocks
00:39 +639 -1: test\mocks\mock_integration_test.dart: Test Helpers generateTestPrivateKey creates a key
00:40 +640 -1: test\mocks\mock_integration_test.dart: Test Helpers TestBlockGraph.create creates linked blocks
00:40 +641 -1: test\network\connection_manager_test.dart: ConnectionManager handleNewConnection creates state and updates metrics
00:40 +642 -1: test\network\nat_traversal_service_test.dart: NatTraversalService Port Types supports TCP protocol
00:40 +643 -1: test\network\mdns_client_test.dart: MDnsClient start and stop
00:40 +644 -1: test\network\mdns_client_test.dart: MDnsClient start and stop
00:40 +645 -1: test\network\mdns_client_test.dart: MDnsClient start and stop
00:40 +646 -1: test\network\mdns_client_test.dart: MDnsClient start and stop
00:40 +647 -1: test\network\mdns_client_test.dart: MDnsClient start and stop
00:40 +648 -1: test\network\mdns_client_test.dart: MDnsClient start and stop
00:40 +649 -1: test\network\mdns_client_test.dart: MDnsClient start and stop
00:40 +650 -1: test\network\mdns_client_test.dart: MDnsClient start and stop
00:40 +651 -1: test\network\mdns_client_test.dart: MDnsClient start and stop
00:40 +652 -1: test\network\mdns_client_test.dart: MDnsClient start and stop
00:40 +653 -1: test\network\mdns_client_test.dart: MDnsClient start already running
00:40 +653 -1: test\network\mdns_client_test.dart: MDnsClient start and stop
2026-02-02T15:35:09.712402 [WARNING] [MDnsClient] [WARNING] MDnsClient already running
00:40 +654 -1: test\network\mdns_client_test.dart: MDnsClient stop when not running
00:40 +654 -1: test\network\mdns_client_test.dart: MDnsClient start and stop
2026-02-02T15:35:09.737647 [WARNING] [MDnsClient] [WARNING] MDnsClient already stopped
00:40 +655 -1: test\network\mdns_client_test.dart: MDnsClient lookup transforms PTR record
00:40 +656 -1: test\network\mdns_client_test.dart: MDnsClient lookup transforms SRV record
00:40 +657 -1: test\network\mdns_client_test.dart: MDnsClient lookup transforms TXT record
00:40 +658 -1: test\network\mdns_client_test.dart: MDnsClient lookup timeout and error handling
00:40 +658 -1: test\network\mdns_client_test.dart: MDnsClient start and stop
2026-02-02T15:35:09.799912 [SEVERE] [MDnsClient] [ERROR] Error during mDNS lookup
Error: Exception: other
Stack trace: null
00:40 +659 -1: test\platform\platform_io_test.dart: IpfsPlatformIO isWeb and isIO
00:40 +660 -1: test\platform\platform_io_test.dart: IpfsPlatformIO pathSeparator
00:40 +661 -1: test\platform\platform_io_test.dart: IpfsPlatformIO writeBytes and readBytes
00:40 +662 -1: test\platform\platform_io_test.dart: IpfsPlatformIO writeBytes and readBytes
00:40 +663 -1: test\platform\platform_io_test.dart: IpfsPlatformIO writeBytes and readBytes
00:40 +664 -1: test\platform\platform_io_test.dart: IpfsPlatformIO writeBytes and readBytes
00:40 +665 -1: test\platform\platform_io_test.dart: IpfsPlatformIO writeBytes and readBytes
00:40 +666 -1: test\platform\platform_io_test.dart: IpfsPlatformIO writeBytes and readBytes
00:41 +667 -1: test\platform\platform_io_test.dart: IpfsPlatformIO readBytes returns null for non-existent file
00:41 +668 -1: test\platform\platform_io_test.dart: IpfsPlatformIO exists
00:41 +669 -1: test\platform\platform_io_test.dart: IpfsPlatformIO delete file and directory
00:41 +670 -1: test\platform\platform_io_test.dart: IpfsPlatformIO createDirectory
00:41 +671 -1: test\platform\platform_io_test.dart: IpfsPlatformIO listDirectory
00:41 +672 -1: test\platform\platform_io_test.dart: IpfsPlatformIO listDirectory returns empty for non-existent
00:41 +673 -1: test\platform\platform_io_test.dart: IpfsPlatformIO getPlatform helper
00:41 +674 -1: test\protocols\bitswap\bitswap_handler_test.dart: Wantlist add and contains
00:41 +675 -1: test\protocols\bitswap\bitswap_handler_test.dart: Wantlist remove removes entry
00:41 +676 -1: test\protocols\bitswap\bitswap_handler_test.dart: Wantlist getEntry returns correct entry
00:41 +677 -1: test\protocols\bitswap\bitswap_handler_test.dart: Wantlist length reflects entries
00:41 +678 -1: test\protocols\bitswap\bitswap_handler_test.dart: Wantlist clear removes all entries
00:41 +679 -1: test\protocols\bitswap\bitswap_handler_test.dart: Wantlist rejects negative priority
00:41 +680 -1: test\protocols\bitswap\bitswap_handler_test.dart: BitLedger tracks sent bytes
00:41 +681 -1: test\protocols\bitswap\bitswap_handler_test.dart: BitLedger tracks received bytes
00:41 +682 -1: test\protocols\bitswap\bitswap_handler_test.dart: BitLedger calculates debt correctly
00:41 +683 -1: test\protocols\bitswap\bitswap_handler_test.dart: BitLedger rejects negative bytes
00:41 +684 -1: test\protocols\bitswap\bitswap_handler_test.dart: BitLedger stores and retrieves block data
00:41 +685 -1: test\protocols\bitswap\bitswap_handler_test.dart: BitLedger throws on missing block data
00:41 +686 -1: test\protocols\bitswap\bitswap_handler_test.dart: LedgerManager getLedger creates new ledger if missing
00:41 +687 -1: test\protocols\bitswap\bitswap_handler_test.dart: LedgerManager getLedger returns same instance for same peer
00:41 +688 -1: test\protocols\bitswap\bitswap_handler_test.dart: LedgerManager clearLedger removes specific peer
00:41 +689 -1: test\protocols\bitswap\bitswap_handler_test.dart: LedgerManager clearAllLedgers removes all
00:41 +690 -1: test\protocols\bitswap\bitswap_handler_test.dart: LedgerManager getBandwidthStats aggregates all ledgers
00:41 +691 -1: test\protocols\bitswap\bitswap_handler_test.dart: Bitswap Message creates empty message
00:41 +692 -1: test\protocols\bitswap\bitswap_handler_test.dart: Bitswap Message addWantlistEntry adds to wantlist
00:41 +693 -1: test\protocols\bitswap\bitswap_handler_test.dart: Bitswap Message addBlockPresence adds presence info
00:41 +694 -1: test\protocols\bitswap\bitswap_handler_test.dart: Bitswap Message serialization produces valid bytes
00:41 +695 -1: test\protocols\dht\connection_statistics_test.dart: ConnectionStatistics starts with zero values
00:41 +696 -1: test\protocols\dht\connection_statistics_test.dart: ConnectionStatistics incrementTotalConnections increases count
00:41 +697 -1: test\protocols\dht\connection_statistics_test.dart: ConnectionStatistics incrementDisconnections updates count and time
00:41 +698 -1: test\protocols\dht\connection_statistics_test.dart: ConnectionStatistics updateConnectionDuration calculates simple moving average
00:41 +699 -1: test\protocols\dht\connection_statistics_test.dart: ConnectionStatistics updateConnectionDuration maintains sliding window
00:41 +700 -1: test\protocols\dht\connection_statistics_test.dart: ConnectionStatistics increments data transfer counters
00:41 +701 -1: test\protocols\dht\connection_statistics_test.dart: ConnectionStatistics updateLatency uses exponential moving average
00:41 +702 -1: test\protocols\dht\connection_statistics_test.dart: ConnectionStatistics updateFromPeerInfo updates status
00:41 +703 -1: test\protocols\dht\delegate_dht_handler_test.dart: DelegateDHTHandler start and stop
2026-02-02T15:35:11.194028 [INFO] [DelegateDHTHandler] [INFO] Starting DelegateDHTHandler with endpoint: http://REDACTED@localhost:5001
00:41 +704 -1: test\protocols\dht\delegate_dht_handler_test.dart: DelegateDHTHandler findProviders returns providers from JSON stream
00:42 +705 -1: test\protocols\dht\delegate_dht_handler_test.dart: DelegateDHTHandler getValue returns value from Type 5 response
00:42 +706 -1: test\protocols\dht\delegate_dht_handler_test.dart: DelegateDHTHandler getValue throws on non-200 or missing value
00:42 +707 -1: test\protocols\dht\delegate_dht_handler_test.dart: DelegateDHTHandler putValue and provide send POST requests
00:42 +708 -1: test\protocols\dht\delegate_dht_handler_test.dart: DelegateDHTHandler findPeer currently returns empty list
00:42 +709 -1: test\protocols\dht\delegate_dht_handler_test.dart: DelegateDHTHandler error handling
00:42 +709 -1: test\protocols\dht\delegate_dht_handler_test.dart: DelegateDHTHandler start and stop
2026-02-02T15:35:11.304987 [SEVERE] [DelegateDHTHandler] [ERROR] Error querying delegate for providers
Error: Exception: net error
Stack trace: null
00:42 +710 -1: test\protocols\dht\delegate_dht_handler_test.dart: DelegateDHTHandler handleRoutingTableUpdate and handleProvideRequest do nothing
00:42 +711 -1: test\protocols\dht\delegate_dht_handler_test.dart: DelegateDHTHandler non-200 responses and other errors in DelegateDHTHandler
00:42 +711 -1: test\protocols\dht\delegate_dht_handler_test.dart: DelegateDHTHandler start and stop
2026-02-02T15:35:11.327456 [WARNING] [DelegateDHTHandler] [WARNING] Delegate findProviders failed: 404
00:42 +712 -1: test\protocols\dht\dht_routing_test.dart: DHT Routing Logic getRoutingKey derives correct SHA-256 hash of Multihash
00:42 +713 -1: test\protocols\dht\dht_routing_test.dart: DHT Routing Logic getRoutingKey handles raw string fallback
00:42 +714 -2: loading test\protocols\dht\kademlia_routing_table_test.dart [E]
  Failed to load "test\protocols\dht\kademlia_routing_table_test.dart":
  test/protocols/dht/kademlia_routing_table_test.dart:148:38: Error: A value of type 'Timestamp/*1*/' can't be assigned to a variable of type 'Timestamp/*2*/'.
   - 'Timestamp/*1*/' is from 'package:dart_ipfs/src/proto/generated/google/protobuf/timestamp.pb.dart' ('lib/src/proto/generated/google/protobuf/timestamp.pb.dart').
   - 'Timestamp/*2*/' is from 'package:protobuf/well_known_types/google/protobuf/timestamp.pb.dart' ('../../AppData/Local/Pub/Cache/hosted/pub.dev/protobuf-6.0.0/lib/well_known_types/google/protobuf/timestamp.pb.dart').
          ..lastSeen = pb_ts.Timestamp.fromDateTime(DateTime.now());
                                       ^
  test/protocols/dht/kademlia_routing_table_test.dart:378:38: Error: A value of type 'Timestamp/*1*/' can't be assigned to a variable of type 'Timestamp/*2*/'.
   - 'Timestamp/*1*/' is from 'package:dart_ipfs/src/proto/generated/google/protobuf/timestamp.pb.dart' ('lib/src/proto/generated/google/protobuf/timestamp.pb.dart').
   - 'Timestamp/*2*/' is from 'package:protobuf/well_known_types/google/protobuf/timestamp.pb.dart' ('../../AppData/Local/Pub/Cache/hosted/pub.dev/protobuf-6.0.0/lib/well_known_types/google/protobuf/timestamp.pb.dart').
          ..lastSeen = pb_ts.Timestamp.fromDateTime(DateTime.now());
                                       ^
00:42 +714 -2: test\protocols\dht\dht_validation_patterns_test.dart: DHT Validation Patterns Alphanumeric Pattern (CID/PeerID validation) matches valid alphanumeric strings
00:42 +715 -2: test\protocols\dht\dht_validation_patterns_test.dart: DHT Validation Patterns Alphanumeric Pattern (CID/PeerID validation) rejects empty strings
00:42 +716 -2: test\protocols\dht\dht_validation_patterns_test.dart: DHT Validation Patterns Alphanumeric Pattern (CID/PeerID validation) rejects strings with special characters
00:42 +717 -2: test\protocols\dht\dht_validation_patterns_test.dart: DHT Validation Patterns Alphanumeric Pattern (CID/PeerID validation) rejects strings with only whitespace
00:42 +718 -2: test\protocols\dht\dht_validation_patterns_test.dart: DHT Validation Patterns Qm CID Extraction Pattern extracts valid Qm-style CID from text
00:42 +719 -2: test\protocols\dht\dht_validation_patterns_test.dart: DHT Validation Patterns Qm CID Extraction Pattern extracts CID from JSON response
00:42 +720 -2: test\protocols\dht\dht_validation_patterns_test.dart: DHT Validation Patterns Qm CID Extraction Pattern returns null when no CID present
00:42 +721 -2: test\protocols\dht\dht_validation_patterns_test.dart: DHT Validation Patterns Qm CID Extraction Pattern extracts first CID when multiple present
00:42 +722 -2: test\protocols\dht\dht_validation_patterns_test.dart: DHT Validation Patterns Integration with Actual DHT Patterns validates typical CID formats work with alphanumeric pattern
00:42 +723 -2: test\protocols\dht\dht_validation_patterns_test.dart: DHT Validation Patterns Integration with Actual DHT Patterns validates typical PeerID formats work with alphanumeric pattern
00:42 +724 -2: test\protocols\dht\dht_validation_patterns_test.dart: DHT Validation Patterns Integration with Actual DHT Patterns rejects invalid CID/PeerID formats
00:42 +725 -2: test\protocols\dht\kademlia_test.dart: KademliaRoutingTable initialize correctly sets up root node
00:42 +726 -2: test\protocols\dht\kademlia_test.dart: KademliaRoutingTable addPeer adds a new peer
00:42 +727 -2: test\protocols\dht\kademlia_test.dart: KademliaRoutingTable removePeer removes an existing peer
00:42 +728 -2: test\protocols\dht\kademlia_test.dart: KademliaRoutingTable bucket capacity limits (no split on fixed buckets)
00:42 +729 -2: test\protocols\dht\kademlia_test.dart: KademliaRoutingTable clear removes all peers
00:42 +730 -2: test\protocols\dht\kademlia_test.dart: KademliaRoutingTable IP diversity check limits peers per IP
00:42 +731 -2: test\protocols\dht\kademlia_tree\helpers_test.dart: DHT Helpers calculateDistance returns correct XOR distance
00:42 +732 -2: test\protocols\dht\kademlia_tree\helpers_test.dart: DHT Helpers getBucketIndex returns correct index
00:42 +733 -2: test\protocols\dht\kademlia_tree\helpers_test.dart: DHT Helpers findClosestNode finds the best node in subtree
00:42 +734 -2: test\protocols\dht\kademlia_tree\helpers_test.dart: DHT Helpers splitNode creates children correctly
00:42 +735 -2: test\protocols\dht\kademlia_tree\helpers_test.dart: DHT Helpers mergeNodes clears children
00:42 +736 -2: test\protocols\dht\kademlia_tree\helpers_test.dart: DHT Helpers findNode returns closer peers on success
00:42 +737 -2: test\protocols\dht\kademlia_tree\helpers_test.dart: DHT Helpers findNode returns empty list on failure
00:43 +738 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore store replicates and retrieves value
00:43 +739 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +740 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +741 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +742 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +743 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +744 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +745 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +746 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +747 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +748 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +749 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +750 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +751 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +752 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +753 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +754 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +755 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +756 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +757 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +758 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore retrieve returns null for expired value
00:43 +759 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore republishValues handles non-expired and expired items
00:43 +760 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore incrementReplicationCount and updateReplicationCount works
00:43 +761 -2: test\protocols\dht\kademlia_tree\value_store_test.dart: ValueStore replicateValue handles failure
00:44 +762 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:35:13.392536 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:13.420279 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:35:13.421280 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:35:13.422279 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
00:44 +763 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start is idempotent
00:44 +763 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:35:13.493810 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:13.494821 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:35:13.494821 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:35:13.495826 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:35:13.498824 [WARNING] [IPNSHandler] [WARNING] IPNSHandler already running
00:44 +764 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle stop clears cache and unsubscribes
00:44 +764 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:35:13.505822 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:13.505822 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:35:13.506821 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:35:13.506821 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:35:13.507821 [INFO] [IPNSHandler] [INFO] IPNS handler stopped successfully
00:44 +765 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle stop is idempotent
00:44 +765 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:35:13.510820 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:13.511819 [WARNING] [IPNSHandler] [WARNING] IPNSHandler already stopped
2026-02-02T15:35:13.511819 [WARNING] [IPNSHandler] [WARNING] IPNSHandler already stopped
00:44 +766 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler getStatus returns running state
00:44 +766 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:35:13.516818 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:13.518817 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:35:13.518817 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:35:13.519817 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
00:44 +767 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler getStatus returns cache info
00:44 +767 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:35:13.525816 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
00:44 +768 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler resolve resolves IPNS name to CID
00:44 +768 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:35:13.544607 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:13.545612 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:35:13.545612 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:35:13.546611 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:35:13.548610 [FINE] [IPNSHandler] [DEBUG] Resolving IPNS name: test-name
2026-02-02T15:35:13.609058 [FINE] [IPNSHandler] [VERBOSE] Caching IPNS resolution for: test-name
2026-02-02T15:35:13.610058 [INFO] [IPNSHandler] [INFO] Successfully resolved IPNS name: test-name to CID: QmNLei78zWmzUdbeRB3CiUfAizWUrbeeZh5K1rhAQKCh51
00:44 +769 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler resolve subscribes to topic when resolving with PubSub
00:44 +769 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:35:13.617890 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:13.618890 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:35:13.618890 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:35:13.619889 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:35:13.619889 [FINE] [IPNSHandler] [DEBUG] Resolving IPNS name: 12D3KooWNxnY1oMhGCX
2026-02-02T15:35:13.634204 [FINE] [IPNSHandler] [VERBOSE] Caching IPNS resolution for: 12D3KooWNxnY1oMhGCX
2026-02-02T15:35:13.635204 [INFO] [IPNSHandler] [INFO] Successfully resolved IPNS name: 12D3KooWNxnY1oMhGCX to CID: QmNLei78zWmzUdbeRB3CiUfAizWUrbeeZh5K1rhAQKCh51
00:44 +770 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler publish validation publish throws for invalid CID format
00:44 +770 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:35:13.649398 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:13.650397 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:35:13.651398 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:35:13.651398 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:35:13.652918 [FINE] [IPNSHandler] [DEBUG] Publishing IPNS record for CID: invalid!cid with key: test
2026-02-02T15:35:13.654917 [SEVERE] [IPNSHandler] [ERROR] Failed to publish IPNS record
Error: Invalid argument(s): Invalid CID format
Stack trace: #0      IPNSHandler.publish (package:dart_ipfs/src/protocols/ipns/ipns_handler.dart:100:9)
#1      main.<anonymous closure>.<anonymous closure>.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/protocols/ipns/ipns_handler_integration_test.dart:165:25)
#2      Throws.matchAsync (package:matcher/src/expect/throws_matcher.dart:85:37)
#3      _expect (package:matcher/src/expect/expect.dart:137:26)
#4      expect (package:matcher/src/expect/expect.dart:65:3)
#5      main.<anonymous closure>.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/protocols/ipns/ipns_handler_integration_test.dart:164:9)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:44 +771 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler publish validation publish throws when keystore is locked
00:44 +771 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:35:13.668422 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:13.668422 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:35:13.669421 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:35:13.669421 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:35:13.669421 [FINE] [IPNSHandler] [DEBUG] Publishing IPNS record for CID: QmTestCID123 with key: mykey
2026-02-02T15:35:13.670421 [SEVERE] [IPNSHandler] [ERROR] Failed to publish IPNS record
Error: Bad state: Keystore is locked. Call securityManager.unlockKeystore() first.
Stack trace: #0      IPNSHandler.publish (package:dart_ipfs/src/protocols/ipns/ipns_handler.dart:105:9)
#1      main.<anonymous closure>.<anonymous closure>.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/protocols/ipns/ipns_handler_integration_test.dart:174:25)
#2      Throws.matchAsync (package:matcher/src/expect/throws_matcher.dart:85:37)
#3      _expect (package:matcher/src/expect/expect.dart:137:26)
#4      expect (package:matcher/src/expect/expect.dart:65:3)
#5      main.<anonymous closure>.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/protocols/ipns/ipns_handler_integration_test.dart:173:9)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:44 +772 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler without PubSub handler works without PubSub
00:44 +772 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:35:13.674419 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:13.683873 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:13.683873 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:35:13.684875 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:35:13.684875 [INFO] [IPNSHandler] [INFO] IPNS handler stopped successfully
00:44 +773 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler without PubSub resolve works without PubSub
00:44 +773 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:35:13.716965 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:13.717966 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:13.717966 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:35:13.717966 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:35:13.718965 [FINE] [IPNSHandler] [DEBUG] Resolving IPNS name: test-name
2026-02-02T15:35:13.719964 [FINE] [IPNSHandler] [VERBOSE] Caching IPNS resolution for: test-name
2026-02-02T15:35:13.719964 [INFO] [IPNSHandler] [INFO] Successfully resolved IPNS name: test-name to CID: QmNLei78zWmzUdbeRB3CiUfAizWUrbeeZh5K1rhAQKCh51
2026-02-02T15:35:13.719964 [INFO] [IPNSHandler] [INFO] IPNS handler stopped successfully
00:44 +774 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler createRecord (deprecated) creates an unsigned Record
00:44 +774 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:35:13.725473 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:13.735697 [WARNING] [IPNSHandler] [WARNING] Using unsigned Record - migrate to IPNSRecord.create()
00:44 +775 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler publishRecord validation throws StateError on unsigned record
00:44 +775 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:35:13.746203 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
00:44 +776 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord (setUpAll)
00:44 +776 -2: test\protocols\ipns\ipns_handler_integration_test.dart: IPNSHandler start/stop lifecycle start initializes handler and starts DHT
2026-02-02T15:35:13.879987 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:13.881532 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:35:13.881532 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:35:13.881532 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
2026-02-02T15:35:13.881532 [FINE] [IPNSHandler] [DEBUG] Resolving IPNS name: cached-name
2026-02-02T15:35:13.883535 [FINE] [IPNSHandler] [VERBOSE] Caching IPNS resolution for: cached-name
2026-02-02T15:35:13.883535 [INFO] [IPNSHandler] [INFO] Successfully resolved IPNS name: cached-name to CID: QmNLei78zWmzUdbeRB3CiUfAizWUrbeeZh5K1rhAQKCh51
2026-02-02T15:35:13.883535 [FINE] [IPNSHandler] [DEBUG] Resolving IPNS name: cached-name
2026-02-02T15:35:13.884535 [FINE] [IPNSHandler] [VERBOSE] Returning cached resolution for: cached-name
2026-02-02T15:35:13.885535 [INFO] [IPNSHandler] [INFO] IPNS handler stopped successfully
00:44 +777 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord (setUpAll)
00:44 +777 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord create generates a signed record
00:44 +778 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord verify returns true for valid signed record
00:44 +779 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord verify returns false for expired record
00:44 +780 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord toCBOR serializes correctly
00:44 +781 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord fromCBOR deserializes correctly
00:44 +782 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord roundtrip preserves data and signature validity
00:45 +783 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord valueCID parses CID from value
00:45 +784 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord toString provides readable output
00:45 +785 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord sequence numbers can be incremented
00:45 +786 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord different key pairs produce different signatures
00:45 +787 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord fromCBOR throws on invalid data
00:45 +788 -2: test\protocols\ipns\ipns_handler_test.dart: IPNSRecord (tearDownAll)
00:45 +788 -2: test\protocols\ipns\ipns_pubsub_test.dart: IPNS over PubSub start() subscribes to PubSub topic
2026-02-02T15:35:14.370965 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:14.407642 [FINE] [IPNSHandler] [VERBOSE] Starting DHT handler...
2026-02-02T15:35:14.414847 [FINE] [IPNSHandler] [VERBOSE] Subscribing to IPNS PubSub topic /ipfs/ipns-1.0.0...
2026-02-02T15:35:14.417984 [INFO] [IPNSHandler] [INFO] IPNS handler started successfully
00:45 +789 -2: test\protocols\ipns\ipns_pubsub_test.dart: IPNS over PubSub publish() broadcasts record via PubSub
00:45 +789 -2: test\protocols\ipns\ipns_pubsub_test.dart: IPNS over PubSub start() subscribes to PubSub topic
2026-02-02T15:35:14.441981 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:14.547829 [FINE] [IPNSHandler] [DEBUG] Publishing IPNS record for CID: QmUNLLsPACCz1vLxQVkXqqLX5R1X345qqfHbsf67hvA3Nn with key: self
2026-02-02T15:35:14.610574 [FINE] [IPNSHandler] [VERBOSE] Published IPNS record to topics: /ipfs/ipns-1.0.0, /record/ACD9pnbgrfpa5sCQumb_VyPZyQYhMAfGcfddqGPXgVUcVw
2026-02-02T15:35:14.610574 [INFO] [IPNSHandler] [INFO] Successfully published signed IPNS record for CID: QmUNLLsPACCz1vLxQVkXqqLX5R1X345qqfHbsf67hvA3Nn
00:45 +790 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord create creates signed record with correct fields
00:45 +791 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord create creates signed record with correct fields
00:45 +792 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord create creates signed record with correct fields
00:45 +793 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord create creates signed record with correct fields
00:45 +794 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord create creates signed record with correct fields
00:45 +795 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord create creates signed record with correct fields
00:45 +796 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord create creates signed record with correct fields
00:45 +797 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord create creates signed record with correct fields
00:45 +798 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord create sets default validity and ttl
00:45 +799 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord create uses custom validity and ttl
00:45 +800 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord verify verifies valid signature
00:45 +801 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord verify fails for tampered value
00:45 +802 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord verify fails for expired record
00:45 +803 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord toCBOR/fromCBOR serializes and deserializes correctly
00:45 +804 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord toCBOR/fromCBOR preserves signature through round-trip
00:45 +805 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord valueCID parses value as CID
00:45 +806 -2: test\protocols\ipns\ipns_record_test.dart: IPNSRecord sign can re-sign record with different key
00:45 +807 -2: loading test\protocol_test.dart
🧪 IPFS Protocol Compliance Test

Testing: CID, Kademlia DHT, Bitswap, UnixFS, DAG-PB
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Test 1: CID v0...
  ✅ CID v0 PASS

Test 2: CID v1...
  ✅ CID v1 PASS

Test 3: Kademlia DHT message...
  ✅ Kademlia PASS

Test 4: Bitswap 1.2.0 message...
  ✅ Bitswap PASS

Test 5: UnixFS data structure...
  ✅ UnixFS PASS

Test 6: DAG-PB (MerkleDAG)...
  ✅ DAG-PB PASS

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Results: 6 passed, 0 failed

🎉 ALL TESTS PASSED!
✅ IPFS Protocol Standardization Verified!

00:46 +807 -2: test\routing\content_routing_test.dart: ContentRouting Provider Conversion empty providers list returns empty
00:46 +808 -2: test\routing\content_routing_test.dart: ContentRouting Provider Conversion providers are converted to strings
00:46 +809 -2: test\routing\content_routing_test.dart: ContentRouting DNSLink Integration successful resolution returns CID
00:46 +810 -2: test\routing\content_routing_test.dart: ContentRouting DNSLink Integration failed resolution returns null
00:46 +811 -2: test\routing\content_routing_test.dart: ContentRouting Lifecycle start initializes and starts DHT client
00:46 +812 -2: test\routing\content_routing_test.dart: ContentRouting Lifecycle stop stops DHT client
00:46 +813 -2: test\rpc_test.dart: RPC Protocol Tests handleBlockPut should store the block
2026-02-02T15:35:15.922752 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:35:15.952126 [FINE] [MetricsCollector] [DEBUG] Starting metrics collection...
2026-02-02T15:35:15.952126 [INFO] [MetricsCollector] [INFO] Metrics collection started
2026-02-02T15:35:15.997946 [INFO] [HiveDatastore] [INFO] HiveDatastore initialized at ./ipfs_data
2026-02-02T15:35:15.997946 [FINE] [IPLDHandler] [DEBUG] Starting IPLDHandler...
2026-02-02T15:35:15.997946 [FINE] [IPLDHandler] [VERBOSE] Initializing IPLD codecs
2026-02-02T15:35:15.999147 [FINE] [IPLDHandler] [DEBUG] IPLDHandler started successfully
2026-02-02T15:35:16.002156 [INFO] [IPFSNode] [INFO] IPFS Node started successfully
00:46 +814 -2: test\rpc_test.dart: RPC Protocol Tests handleBlockPut should store the block
00:46 +815 -2: test\rpc_test.dart: RPC Protocol Tests handleBlockPut should store the block
00:46 +816 -2: test\rpc_test.dart: RPC Protocol Tests handleBlockPut should store the block
00:46 +817 -2: test\rpc_test.dart: RPC Protocol Tests handleBlockPut should store the block
00:46 +818 -2: test\rpc_test.dart: RPC Protocol Tests handleBlockPut should store the block
00:46 +819 -2: test\rpc_test.dart: RPC Protocol Tests handleBlockPut should store the block
Put block with Key: bbkujcbpcwqev4ve4wsqayadcy46xdq3un53jfjy5zxjbjhacngcuddlzx
2026-02-02T15:35:16.108969 [FINE] [IPLDHandler] [DEBUG] Stopping IPLDHandler...
2026-02-02T15:35:16.108969 [FINE] [IPLDHandler] [DEBUG] IPLDHandler stopped successfully
2026-02-02T15:35:16.121179 [INFO] [HiveDatastore] [INFO] HiveDatastore closed
2026-02-02T15:35:16.122685 [FINE] [MetricsCollector] [DEBUG] Stopping metrics collection
2026-02-02T15:35:16.123688 [INFO] [IPFSNode] [INFO] IPFS Node stopped successfully
00:47 +820 -2: test\services\gateway\adaptive_compression_handler_test.dart: AdaptiveCompressionHandler getOptimalCompression selects correct type
00:47 +821 -2: test\services\gateway\adaptive_compression_handler_test.dart: AdaptiveCompressionHandler compressBlock returns original if disabled
00:47 +822 -2: test\services\gateway\compressed_cache_store_test.dart: CompressedCacheStore storeCompressedData stores data and metadata
00:47 +823 -2: test\services\gateway\compressed_cache_store_test.dart: CompressedCacheStore storeCompressedData stores data and metadata
00:47 +824 -2: test\services\gateway\compressed_cache_store_test.dart: CompressedCacheStore storeCompressedData stores data and metadata
00:47 +825 -2: test\services\gateway\compressed_cache_store_test.dart: CompressedCacheStore getCompressedData retrieves and decompresses data
00:47 +826 -2: test\services\gateway\compressed_cache_store_test.dart: CompressedCacheStore getCompressedData returns null for missing file
00:47 +827 -2: test\services\gateway\compressed_cache_store_test.dart: CompressedCacheStore initialization creates directory if missing
00:48 +828 -2: test\services\gateway\content_type_handler_test.dart: ContentTypeHandler Detection detectContentType detects known signatures
00:48 +829 -2: test\services\gateway\file_preview_handler_test.dart: FilePreviewHandler generatePreview returns null for unsupported type
00:48 +830 -2: test\services\gateway\content_type_handler_test.dart: ContentTypeHandler Detection detectContentType falls back to octet-stream
00:48 +831 -2: test\services\gateway\content_type_handler_test.dart: ContentTypeHandler Detection detectContentType detects text
00:48 +832 -2: test\services\gateway\content_type_handler_test.dart: ContentTypeHandler Detection detectContentType detects text
00:48 +833 -2: test\services\gateway\file_preview_handler_test.dart: FilePreviewHandler generateImagePreview generates valid base64 image tag
00:48 +834 -2: test\services\gateway\content_type_handler_test.dart: ContentTypeHandler Detection detectContentType favors filename
00:48 +835 -2: test\services\gateway\file_preview_handler_test.dart: FilePreviewHandler generateTextPreview handles JSON and escapes XSS
00:48 +836 -2: test\services\gateway\content_type_handler_test.dart: ContentTypeHandler Processing processContent renders markdown
00:48 +837 -2: test\services\gateway\file_preview_handler_test.dart: FilePreviewHandler generateTextPreview formats Markdown correctly
00:48 +838 -2: test\services\gateway\file_preview_handler_test.dart: FilePreviewHandler generateTextPreview formats Markdown correctly
00:48 +839 -2: test\services\gateway\file_preview_handler_test.dart: FilePreviewHandler generateTextPreview formats Markdown correctly
00:48 +840 -2: test\services\gateway\gateway_helpers_test.dart: GatewayLruCache capacity check
00:48 +841 -2: test\services\gateway\gateway_helpers_test.dart: GatewayLruCache put/get/eviction
00:48 +842 -2: test\services\gateway\gateway_helpers_test.dart: GatewayLruCache clear
00:48 +843 -2: test\services\gateway\gateway_helpers_test.dart: ContentTypeHandler detectContentType from filename
00:48 +844 -2: test\services\gateway\gateway_helpers_test.dart: ContentTypeHandler detectContentType from content
00:48 +845 -2: test\services\gateway\gateway_helpers_test.dart: ContentTypeHandler processContent markdown
00:48 +846 -2: test\services\gateway\gateway_helpers_test.dart: ContentTypeHandler processContent markdown
00:48 +846 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:35:18.129711 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:35:18.144616 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:48 +847 -2: test\services\gateway\gateway_helpers_test.dart: ContentTypeHandler processContent markdown
00:48 +847 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:35:18.152891 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
00:48 +848 -2: test\services\gateway\gateway_server_test.dart: GatewayServer cannot start twice
00:48 +848 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:35:18.159963 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:48 +849 -2: test\services\gateway\gateway_helpers_test.dart: DirectoryParser parseDirectoryBlock valid unixfs
00:48 +849 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:35:18.165220 [SEVERE] [GatewayServer] [ERROR] Failed to start gateway server
Error: Exception: Serve failed
Stack trace: #0      MockHttpServerAdapter.serve (file:///C:/Users/Eduardo/Documents/ipfs/test/services/gateway/gateway_server_test.dart:43:21)
#1      GatewayServer.start (package:dart_ipfs/src/services/gateway/gateway_server.dart:114:35)
#2      main.<anonymous closure>.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/services/gateway/gateway_server_test.dart:125:27)
#3      Throws.matchAsync (package:matcher/src/expect/throws_matcher.dart:85:37)
#4      _expect (package:matcher/src/expect/expect.dart:137:26)
#5      expect (package:matcher/src/expect/expect.dart:65:3)
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/services/gateway/gateway_server_test.dart:125:7)
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:25)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:48 +850 -2: test\services\gateway\gateway_helpers_test.dart: DirectoryParser parseDirectoryBlock valid unixfs
00:48 +850 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:35:18.168809 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:35:18.191150 [INFO] [GatewayServer] [INFO] [GET] health - 200 (5ms)
2026-02-02T15:35:18.206059 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:48 +851 -2: test\services\gateway\gateway_helpers_test.dart: DirectoryParser parseDirectoryBlock valid unixfs
00:48 +851 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:35:18.210467 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:35:18.211483 [INFO] [GatewayServer] [INFO] [GET] api/v0/version - 200 (0ms)
2026-02-02T15:35:18.218696 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:48 +852 -2: test\services\gateway\gateway_helpers_test.dart: DirectoryParser parseDirectoryBlock valid unixfs
00:48 +852 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:35:18.222220 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:35:18.222725 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:49 +853 -2: test\services\gateway\gateway_helpers_test.dart: DirectoryParser parseDirectoryBlock valid unixfs
00:49 +853 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:35:18.226052 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:35:18.227056 [INFO] [GatewayServer] [INFO] [GET] health - 200 (0ms)
2026-02-02T15:35:18.228056 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:49 +854 -2: test\services\gateway\gateway_helpers_test.dart: DirectoryParser parseDirectoryBlock valid unixfs
00:49 +855 -2: test\services\gateway\gateway_server_test.dart: GatewayServer Rate limiting middleware
00:49 +855 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:35:18.232929 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:35:18.236475 [INFO] [GatewayServer] [INFO] [GET] health - 200 (0ms)
2026-02-02T15:35:18.237490 [INFO] [GatewayServer] [INFO] [GET] health - 200 (0ms)
2026-02-02T15:35:18.238605 [WARNING] [GatewayServer] [WARNING] Rate limit exceeded for 1.2.3.4
2026-02-02T15:35:18.240112 [INFO] [GatewayServer] [INFO] [GET] health - 200 (0ms)
2026-02-02T15:35:18.241135 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:49 +856 -2: test\services\gateway\gateway_helpers_test.dart: DirectoryParser generateHtmlListing
00:49 +856 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:35:18.244133 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:35:18.260069 [INFO] [GatewayServer] [INFO] [HEAD] ipfs/QmUNLLsPACCz1vLxQVkXqqLX5R1X345qqfHbsf67hvA3Nn - 404 (14ms)
2026-02-02T15:35:18.263574 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:49 +857 -2: test\services\gateway\gateway_helpers_test.dart: DirectoryParser generateHtmlListing
00:49 +858 -2: test\services\gateway\gateway_server_test.dart: GatewayServer Rate limiting middleware with X-Forwarded-For
00:49 +858 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:35:18.267098 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:35:18.269102 [INFO] [GatewayServer] [INFO] [GET] health - 200 (0ms)
2026-02-02T15:35:18.270102 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:49 +859 -2: test\services\gateway\gateway_server_test.dart: GatewayServer routing - ipns support
00:49 +859 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:35:18.276168 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:35:18.278168 [INFO] [GatewayServer] [INFO] [GET] ipns/test.eth - 404 (1ms)
00:49 +860 -2: test\services\gateway\gateway_server_test.dart: GatewayServer Logging middleware executes
00:49 +860 -2: test\services\gateway\gateway_server_test.dart: GatewayServer initial state
2026-02-02T15:35:18.282166 [INFO] [GatewayServer] [INFO] Gateway server listening on http://localhost:8080
2026-02-02T15:35:18.284671 [INFO] [GatewayServer] [INFO] [GET] health - 200 (1ms)
2026-02-02T15:35:18.285676 [INFO] [GatewayServer] [INFO] Gateway server stopped
00:49 +861 -2: test\services\gateway\gateway_services_test.dart: GatewayHandler should serve text file
00:49 +862 -2: test\services\gateway\gateway_services_test.dart: GatewayHandler should serve text file
00:49 +863 -2: test\services\gateway\gateway_services_test.dart: GatewayHandler should serve text file
00:49 +864 -2: test\services\gateway\gateway_services_test.dart: GatewayHandler should serve text file
00:49 +865 -2: test\services\gateway\gateway_services_test.dart: GatewayHandler should serve text file
00:49 +866 -2: test\services\gateway\gateway_services_test.dart: GatewayHandler should return 404 for missing block
00:49 +867 -2: test\services\gateway\gateway_services_test.dart: GatewayHandler should handle range request
00:49 +868 -2: test\services\gateway\gateway_services_test.dart: PersistentPreviewCache should cache and retrieve preview
00:49 +869 -2: test\services\gateway\gateway_services_test.dart: PersistentPreviewCache should evict old entries when cache is full
00:49 +870 -2: test\services\gateway\gateway_services_test.dart: CachedPreviewGenerator should generate and cache new preview
00:49 +871 -2: test\services\gateway\gateway_services_test.dart: CachedPreviewGenerator should return cached preview if available
00:49 +872 -2: test\services\gateway_test.dart: GatewayHandler handlePath returns 404 for missing block
00:50 +873 -2: test\services\gateway_test.dart: GatewayHandler handlePath serves raw block if not UnixFS
00:50 +874 -2: test\services\gateway_test.dart: GatewayHandler handlePath serves UnixFS File
00:50 +875 -2: test\services\gateway_test.dart: GatewayHandler handlePath serves range request
00:50 +876 -2: test\services\gateway_test.dart: GatewayHandler handlePath renders Directory
00:50 +877 -2: test\services\gateway_test.dart: GatewayHandler handlePath navigates directory to subpath
00:50 +878 -2: test\services\gateway_test.dart: GatewayHandler handlePath resolves IPNS name
00:50 +879 -2: test\services\gateway_test.dart: GatewayHandler handlePath returns 404 for unknown IPNS name
00:50 +879 -2: test\services\gateway_test.dart: GatewayHandler handlePath returns 404 for missing block
2026-02-02T15:35:19.426665 [WARNING] [GatewayHandler] [WARNING] Failed to resolve IPNS name unknown: Exception: Failed
00:50 +880 -3: loading test\services\general_services_test.dart [E]
  Failed to load "test\services\general_services_test.dart":
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/protobuf/any.pb.dart:147:50: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<Any> createRepeated() => $pb.PbList<Any>();
                                                   ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:73:56: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<RetryInfo> createRepeated() => $pb.PbList<RetryInfo>();
                                                         ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:134:56: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<DebugInfo> createRepeated() => $pb.PbList<DebugInfo>();
                                                         ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:201:11: Error: Couldn't find constructor 'PbList'.
        $pb.PbList<QuotaFailure_Violation>();
            ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:288:11: Error: Couldn't find constructor 'PbList'.
        $pb.PbList<QuotaFailure>();
            ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:371:56: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<ErrorInfo> createRepeated() => $pb.PbList<ErrorInfo>();
                                                         ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:467:11: Error: Couldn't find constructor 'PbList'.
        $pb.PbList<PreconditionFailure_Violation>();
            ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:557:11: Error: Couldn't find constructor 'PbList'.
        $pb.PbList<PreconditionFailure>();
            ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:613:11: Error: Couldn't find constructor 'PbList'.
        $pb.PbList<BadRequest_FieldViolation>();
            ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:684:57: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<BadRequest> createRepeated() => $pb.PbList<BadRequest>();
                                                          ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:739:58: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<RequestInfo> createRepeated() => $pb.PbList<RequestInfo>();
                                                           ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:818:11: Error: Couldn't find constructor 'PbList'.
        $pb.PbList<ResourceInfo>();
            ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:915:56: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<Help_Link> createRepeated() => $pb.PbList<Help_Link>();
                                                         ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:986:51: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<Help> createRepeated() => $pb.PbList<Help>();
                                                    ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/error_details.pb.dart:1042:11: Error: Couldn't find constructor 'PbList'.
        $pb.PbList<LocalizedMessage>();
            ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/protobuf/duration.pb.dart:123:55: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<Duration> createRepeated() => $pb.PbList<Duration>();
                                                        ^^^^^^
  ../../AppData/Local/Pub/Cache/hosted/pub.dev/grpc-4.3.1/lib/src/generated/google/rpc/status.pb.dart:73:53: Error: Couldn't find constructor 'PbList'.
    static $pb.PbList<Status> createRepeated() => $pb.PbList<Status>();
                                                      ^^^^^^
00:50 +880 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
2026-02-02T15:35:20.076919 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:35:20.108495 [INFO] [RPCServer] [INFO] RPC server configured with API key authentication
2026-02-02T15:35:20.138649 [INFO] [RPCServer] [INFO] RPC server listening on http://localhost:8081
00:50 +881 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
00:50 +882 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
00:51 +883 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
00:51 +884 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
00:51 +885 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
00:51 +886 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
00:51 +887 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
00:51 +888 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
00:51 +889 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
2026-02-02T15:35:20.341645 [INFO] [RPCServer] [INFO] RPC server stopped
00:51 +890 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return node ID
00:51 +890 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
2026-02-02T15:35:20.349204 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:35:20.350714 [INFO] [RPCServer] [INFO] RPC server configured with API key authentication
2026-02-02T15:35:20.365751 [INFO] [RPCServer] [INFO] RPC server listening on http://localhost:8081
2026-02-02T15:35:20.391605 [INFO] [RPCServer] [INFO] RPC server stopped
00:51 +891 -3: test\services\rpc\rpc_server_test.dart: RPCServer should require API key for protected endpoints
00:51 +891 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
2026-02-02T15:35:20.394789 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:35:20.395827 [INFO] [RPCServer] [INFO] RPC server configured with API key authentication
2026-02-02T15:35:20.398857 [INFO] [RPCServer] [INFO] RPC server listening on http://localhost:8081
2026-02-02T15:35:20.428400 [WARNING] [RPCServer] [WARNING] Unauthorized RPC request to /api/v0/swarm/peers from unknown
2026-02-02T15:35:20.432512 [INFO] [RPCServer] [INFO] RPC server stopped
00:51 +892 -3: test\services\rpc\rpc_server_test.dart: RPCServer should allow protected endpoints with valid API key
00:51 +892 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
2026-02-02T15:35:20.438917 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:35:20.440423 [INFO] [RPCServer] [INFO] RPC server configured with API key authentication
2026-02-02T15:35:20.442674 [INFO] [RPCServer] [INFO] RPC server listening on http://localhost:8081
2026-02-02T15:35:20.487282 [INFO] [RPCServer] [INFO] RPC server stopped
00:51 +893 -3: test\services\rpc\rpc_server_test.dart: RPCServer should reject invalid API key
00:51 +893 -3: test\services\rpc\rpc_server_test.dart: RPCServer should return version details
2026-02-02T15:35:20.491298 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:35:20.491803 [INFO] [RPCServer] [INFO] RPC server configured with API key authentication
2026-02-02T15:35:20.493814 [INFO] [RPCServer] [INFO] RPC server listening on http://localhost:8081
2026-02-02T15:35:20.525461 [WARNING] [RPCServer] [WARNING] Unauthorized RPC request to /api/v0/swarm/peers from unknown
2026-02-02T15:35:20.530935 [INFO] [RPCServer] [INFO] RPC server stopped
00:51 +894 -3: test\transport\http_gateway_client_test.dart: HttpGatewayClient get returns data when gateway succeeds
2026-02-02T15:35:20.734781 [INFO] [HttpGatewayClient] [INFO] Successfully retrieved CID QmHash from https://ipfs.io/ipfs/
00:51 +895 -3: test\transport\http_gateway_client_test.dart: HttpGatewayClient get returns null when all gateways fail
00:51 +895 -3: test\transport\http_gateway_client_test.dart: HttpGatewayClient get returns data when gateway succeeds
2026-02-02T15:35:20.768786 [WARNING] [HttpGatewayClient] [WARNING] Failed to retrieve CID QmHash from all gateways
00:51 +896 -3: test\transport\http_gateway_client_test.dart: HttpGatewayClient get uses specific baseUrl if provided
00:51 +897 -3: test\transport\http_gateway_client_test.dart: HttpGatewayClient get handles fallback correctly
00:51 +897 -3: test\transport\http_gateway_client_test.dart: HttpGatewayClient get returns data when gateway succeeds
2026-02-02T15:35:20.779988 [INFO] [HttpGatewayClient] [INFO] Successfully retrieved CID QmHash from https://dweb.link/ipfs/
00:51 +898 -3: test\transport\http_gateway_client_test.dart: HttpGatewayClient isReachable returns true on success
00:51 +899 -3: test\transport\http_gateway_client_test.dart: HttpGatewayClient isReachable returns false on failure
00:51 +900 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:20.933447 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:20.948138 [FINE] [Libp2pRouter] [DEBUG] Deriving Ed25519 identity from seed
2026-02-02T15:35:21.052236 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
00:51 +901 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should not re-initialize
00:51 +901 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.100884 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:21.103008 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:21.111039 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:21.113744 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already initialized
00:51 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage start should handle empty listen addresses
00:51 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.126017 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:21.127029 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:21.133495 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:21.133495 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:21.142650 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:21.163334 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:21.221763 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.221763 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6 - Initial _network.listenAddresses: []
00:52 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:21.224282 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
00:52 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.236821 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6, Host hashCode: 664566188
2026-02-02T15:35:21.241330 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.243344 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.243344 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:21.244343 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6
2026-02-02T15:35:21.245343 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:21.254101 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:35:21.260154 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:35:21.261172 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:21.261172 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:21.262172 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:21.262172 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:21.263172 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:21.263172 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:21.263172 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:21.264171 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:21.264171 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
00:52 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:21.265170 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
00:52 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.267550 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:35:21.269553 [INFO] [Config] [Config.newNode] for peer 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6: Host created. Listening will be handled by host.start().
2026-02-02T15:35:21.279506 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.280506 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6, network.hashCode: 60775654, initial network.listenAddresses: []
2026-02-02T15:35:21.281505 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.281505 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4001]. Attempting to listen via _network.listen().
2026-02-02T15:35:21.281505 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.284015 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4001] for peer 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6
2026-02-02T15:35:21.284015 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.285520 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4001 for peer 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6
2026-02-02T15:35:21.286542 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4001 with transport TCPTransport for peer 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6
2026-02-02T15:35:21.286542 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4001 with transport TCPTransport
2026-02-02T15:35:21.303454 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4001. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4001 for peer 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6
2026-02-02T15:35:21.303454 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4001 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4001
2026-02-02T15:35:21.304456 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4001. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4001] for peer 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6
2026-02-02T15:35:21.304456 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.312959 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4001 for peer 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6. This should be resolved to concrete addresses by the host.
2026-02-02T15:35:21.313958 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6
2026-02-02T15:35:21.316265 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4001
2026-02-02T15:35:21.317269 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6.
2026-02-02T15:35:21.317269 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.317269 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.318268 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.318268 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.318268 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.320268 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.321268 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:21.322268 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.322773 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.329302 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4001 (first component not IP)
2026-02-02T15:35:21.330317 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:21.331317 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4001 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4001
2026-02-02T15:35:21.332318 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4001 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4001
2026-02-02T15:35:21.332822 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.332822 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4001 (first component not IP)
2026-02-02T15:35:21.332822 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:21.334586 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6 - resolvedAddrs: {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:35:21.335608 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:35:21.336624 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:35:21.336624 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6 - Returning: [/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001]
2026-02-02T15:35:21.411560 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:21.418074 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.420073 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 60775654, network.listenAddresses: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.438383 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:21.438383 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6, Host hashCode: 664566188
2026-02-02T15:35:21.438383 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.438383 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.438383 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4001 (first component not IP)
2026-02-02T15:35:21.439901 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:21.440420 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4001 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4001
2026-02-02T15:35:21.440420 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4001 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4001
2026-02-02T15:35:21.440420 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.440420 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4001 (first component not IP)
2026-02-02T15:35:21.441425 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:21.441425 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6 - resolvedAddrs: {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:35:21.441425 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:35:21.441425 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:35:21.442424 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6 - Returning: [/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001]
2026-02-02T15:35:21.442424 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6
2026-02-02T15:35:21.442424 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:21.443425 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:21.444425 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6, Host hashCode: 664566188
2026-02-02T15:35:21.444425 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.446423 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.446423 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4001 (first component not IP)
2026-02-02T15:35:21.447424 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:21.447424 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4001 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4001
2026-02-02T15:35:21.447424 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4001 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4001
2026-02-02T15:35:21.448423 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.448423 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4001 (first component not IP)
2026-02-02T15:35:21.448423 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:21.449423 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6 - resolvedAddrs: {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:35:21.449423 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:35:21.449423 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:35:21.449423 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6 - Returning: [/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001]
2026-02-02T15:35:21.450422 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6
00:52 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:21.452613 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:21.452613 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:21.453614 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
00:52 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.456611 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:21.457613 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:21.458611 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:21.458611 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.459612 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 60775654, network.listenAddresses: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.459612 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.459612 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 60775654, network.listenAddresses: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.464133 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6
2026-02-02T15:35:21.467131 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:21.467131 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6, Host hashCode: 664566188
2026-02-02T15:35:21.468131 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.468131 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.468131 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4001 (first component not IP)
2026-02-02T15:35:21.468131 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:21.469130 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4001 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4001
2026-02-02T15:35:21.469130 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4001 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4001
2026-02-02T15:35:21.469130 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.469130 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4001 (first component not IP)
2026-02-02T15:35:21.469130 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:21.469130 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6 - resolvedAddrs: {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:35:21.469130 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:35:21.470636 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001}
2026-02-02T15:35:21.470636 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6 - Returning: [/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001]
2026-02-02T15:35:21.470636 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4001, /ip4/172.29.112.1/tcp/4001] for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6
2026-02-02T15:35:21.470636 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6
2026-02-02T15:35:21.473179 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.473179 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 60775654, network.listenAddresses: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.473179 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:21.474178 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.474178 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 60775654, network.listenAddresses: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.476188 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:35:21.476188 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:21.477191 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4001 with ID: 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6
2026-02-02T15:35:21.478193 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:35:21.483612 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
00:52 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:21.483612 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
00:52 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.505977 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:21.505977 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
00:52 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:21.507777 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
00:52 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.516842 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:35:21.518688 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:35:21.519694 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:35:21.520693 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:35:21.521695 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:35:21.523202 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
00:52 +902 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:21.524224 [FINE] [ResourceManagerImpl] ResourceManager initialized.
00:52 +902 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.526737 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:21.528258 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:21.529258 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:21.577771 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:21.583346 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.590591 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.591096 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 81ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:61:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:21.591609 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 86ms (dial: 82ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:61:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:21.591609 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:21.592613 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.592613 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:35:21.594124 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:35:21.594124 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:35:21.594124 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:35:21.594124 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:35:21.595123 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:21.595123 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:21.606812 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:21.607812 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.607812 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.607812 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 13ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:61:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:21.608811 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 15ms (dial: 14ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:61:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:21.608811 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:21.608811 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.619597 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:35:21.620596 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:35:21.621596 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:35:21.621596 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:35:21.622595 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:35:21.622595 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:21.623596 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:21.631348 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:21.632352 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.632352 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.632352 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 11ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:61:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:21.633502 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 11ms (dial: 11ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:61:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:21.633502 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:21.633502 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.633502 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:35:21.634510 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:35:21.634510 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:35:21.634510 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:35:21.634510 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:35:21.635516 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:21.636021 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:21.637025 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:21.637767 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.637767 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.638781 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 3ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:61:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:21.638781 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 4ms (dial: 4ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:61:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:21.638781 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:21.638781 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.639780 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:21.641288 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:21.641793 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:21.642445 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:21.643448 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:21.644954 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
00:52 +903 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
00:52 +903 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.663642 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:21.664148 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:21.664148 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:21.664148 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:21.668683 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:35:21.683614 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:21.683614 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:21.695155 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:21.696155 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:21.700154 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:21.702154 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:21.705153 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.705153 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq - Initial _network.listenAddresses: []
2026-02-02T15:35:21.713848 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq, Host hashCode: 141309943
2026-02-02T15:35:21.714847 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.715845 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.715845 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:21.715845 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq
2026-02-02T15:35:21.715845 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:21.716846 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:35:21.726777 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:35:21.726777 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:21.726777 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:21.726777 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:21.727783 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:21.727783 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:21.727783 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:21.727783 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:21.727783 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:21.727783 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:21.727783 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:35:21.728787 [INFO] [Config] [Config.newNode] for peer 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq: Host created. Listening will be handled by host.start().
2026-02-02T15:35:21.729292 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.729292 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq, network.hashCode: 338728907, initial network.listenAddresses: []
2026-02-02T15:35:21.729292 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.730308 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4001]. Attempting to listen via _network.listen().
2026-02-02T15:35:21.730308 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.730308 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4001] for peer 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq
2026-02-02T15:35:21.731307 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4001]
2026-02-02T15:35:21.731307 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4001 for peer 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq
2026-02-02T15:35:21.731307 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4001 with transport TCPTransport for peer 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq
2026-02-02T15:35:21.731307 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4001 with transport TCPTransport
00:52 +903 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:21.742634 [FINE] [ResourceManagerImpl] ResourceManager initialized.
00:52 +903 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.764704 [FINE] [Swarm] [Swarm listen] Error calling transport.listen() for /ip4/0.0.0.0/tcp/4001: Exception: Failed to bind: SocketException: Failed to create server socket (OS Error: The shared flag to bind() needs to be `true` if binding multiple times on the same (address, port) combination.), address = 0.0.0.0, port = 4001 for peer 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq
2026-02-02T15:35:21.765704 [SEVERE] [Swarm] Error listening on /ip4/0.0.0.0/tcp/4001 with transport Instance of 'TCPTransport': Exception: Failed to bind: SocketException: Failed to create server socket (OS Error: The shared flag to bind() needs to be `true` if binding multiple times on the same (address, port) combination.), address = 0.0.0.0, port = 4001
2026-02-02T15:35:21.765704 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq.
2026-02-02T15:35:21.765704 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.766704 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: []
2026-02-02T15:35:21.766704 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.766704 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: []
2026-02-02T15:35:21.766704 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.766704 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: []
2026-02-02T15:35:21.766704 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:21.766704 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.766704 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.766704 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:21.768209 [FINE] [basichost] Host has no addresses at the moment of self-record creation; record will reflect this.
2026-02-02T15:35:21.780034 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:21.780034 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.780034 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 338728907, network.listenAddresses: []
2026-02-02T15:35:21.783147 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:21.791672 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq, Host hashCode: 141309943
2026-02-02T15:35:21.791672 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.791672 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.791672 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:21.792677 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq
2026-02-02T15:35:21.792677 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:21.792677 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:21.792677 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq, Host hashCode: 141309943
2026-02-02T15:35:21.792677 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.792677 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.793677 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:21.793677 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq
2026-02-02T15:35:21.794676 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:21.794676 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:21.794676 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:21.794676 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.794676 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 338728907, network.listenAddresses: []
2026-02-02T15:35:21.795676 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.795676 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 338728907, network.listenAddresses: []
2026-02-02T15:35:21.795676 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq
2026-02-02T15:35:21.795676 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:21.796677 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq, Host hashCode: 141309943
2026-02-02T15:35:21.796677 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.796677 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.796677 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:21.796677 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq
2026-02-02T15:35:21.797675 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq
2026-02-02T15:35:21.797675 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.797675 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 338728907, network.listenAddresses: []
2026-02-02T15:35:21.798674 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:21.798674 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.798674 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 338728907, network.listenAddresses: []
2026-02-02T15:35:21.799252 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=0, protocols=5
2026-02-02T15:35:21.799252 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:21.799252 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4001 with ID: 12D3KooWCumJEhgBomeCVGs3MUHtqh5iuD7ZwWrPq16GWC8ov4fq
2026-02-02T15:35:21.799759 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:35:21.800763 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:21.800763 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:21.801937 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:21.807935 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:35:21.808935 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:35:21.808935 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=0, protocols=6
2026-02-02T15:35:21.808935 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:21.808935 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:21.808935 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:35:21.808935 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:35:21.809935 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:21.809935 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
00:52 +903 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:21.811439 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.812443 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac - Initial _network.listenAddresses: []
00:52 +903 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.818441 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:21.819441 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.819441 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.820441 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 12ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:74:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:21.820441 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 19ms (dial: 12ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:74:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:21.821441 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:21.821441 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.821441 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:35:21.822441 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:35:21.822441 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:35:21.822441 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:35:21.822441 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:35:21.823440 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:21.823440 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
00:52 +903 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:21.824440 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac, Host hashCode: 435296991
00:52 +903 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.825440 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:21.825440 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.825440 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.825440 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 3ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:74:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:21.826440 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 4ms (dial: 4ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:74:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:21.826440 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:21.826440 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.826440 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:35:21.827440 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
00:52 +903 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:21.827440 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
00:52 +903 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.827440 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:35:21.827440 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:35:21.827440 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:35:21.827440 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:21.828439 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:21.828439 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:21.828439 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.828439 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
00:52 +903 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:21.829439 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
00:52 +903 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.829439 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:74:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:21.829439 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 1ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:74:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:52 +903 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:21.829439 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
00:52 +903 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.829439 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:21.829439 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.830437 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
00:52 +903 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:21.830437 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac
00:52 +903 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.830437 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:35:21.831438 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
00:52 +903 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:21.831438 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
00:52 +903 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.831438 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:35:21.831438 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:35:21.832437 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:21.832437 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:21.832437 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:21.832437 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.856406 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.856921 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 26ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:74:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:21.856921 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 26ms (dial: 26ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:74:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:21.856921 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:21.857937 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:21.857937 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:21.857937 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:21.857937 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:21.857937 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:21.857937 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:21.857937 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
00:52 +904 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
00:52 +904 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.858936 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:21.858936 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:21.858936 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:21.859936 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:21.859936 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:35:21.881976 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:21.882976 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:21.886974 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:21.886974 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:21.887974 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:21.888975 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:21.889975 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.889975 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn - Initial _network.listenAddresses: []
2026-02-02T15:35:21.890974 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn, Host hashCode: 695510913
2026-02-02T15:35:21.890974 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.891974 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.891974 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:21.891974 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn
2026-02-02T15:35:21.891974 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:21.892974 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:52 +904 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:21.896973 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:35:21.914975 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:35:21.914975 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:21.915961 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:21.916467 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:21.917471 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:21.917976 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:21.917976 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:21.917976 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:21.918981 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:21.918981 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:21.925342 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:35:21.926348 [INFO] [Config] [Config.newNode] for peer 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac: Host created. Listening will be handled by host.start().
2026-02-02T15:35:21.933098 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.936623 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac, network.hashCode: 1052772028, initial network.listenAddresses: []
2026-02-02T15:35:21.936623 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:21.937623 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4101]. Attempting to listen via _network.listen().
2026-02-02T15:35:21.937623 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:21.939622 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4101] for peer 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac
2026-02-02T15:35:21.939622 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:21.941127 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4101 for peer 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac
2026-02-02T15:35:21.953792 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4101 with transport TCPTransport for peer 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac
2026-02-02T15:35:21.954792 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4101 with transport TCPTransport
00:52 +904 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:21.989518 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:35:21.989518 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:21.990519 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:21.990519 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:21.990519 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:21.990519 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:21.990519 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:21.990519 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:21.990519 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:21.991519 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:21.991519 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:35:21.991519 [INFO] [Config] [Config.newNode] for peer 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn: Host created. Listening will be handled by host.start().
2026-02-02T15:35:21.991519 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:21.991519 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn, network.hashCode: 677188179, initial network.listenAddresses: []
2026-02-02T15:35:21.991519 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:35:21.992518 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/0]. Attempting to listen via _network.listen().
2026-02-02T15:35:21.992518 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:35:21.992518 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/0] for peer 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn
2026-02-02T15:35:21.992518 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:35:21.992518 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/0 for peer 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn
2026-02-02T15:35:21.992518 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/0 with transport TCPTransport for peer 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn
2026-02-02T15:35:21.992518 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/0 with transport TCPTransport
00:52 +904 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.012159 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4101. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4101 for peer 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac
2026-02-02T15:35:22.013176 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4101 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4101
2026-02-02T15:35:22.013176 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4101. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4101] for peer 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac
2026-02-02T15:35:22.013176 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.014175 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4101 for peer 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac. This should be resolved to concrete addresses by the host.
2026-02-02T15:35:22.015175 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac
2026-02-02T15:35:22.018674 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4101
2026-02-02T15:35:22.018674 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac.
2026-02-02T15:35:22.019674 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.019674 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.019674 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.020674 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.020674 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.020674 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.020674 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:22.022179 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
00:52 +904 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.030220 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/0. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/58642 for peer 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn
2026-02-02T15:35:22.030220 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/0 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/58642
2026-02-02T15:35:22.031220 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/58642. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58642] for peer 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn
2026-02-02T15:35:22.031220 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.031220 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/58642 for peer 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn. This should be resolved to concrete addresses by the host.
2026-02-02T15:35:22.031220 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn
2026-02-02T15:35:22.031220 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/58642
2026-02-02T15:35:22.031220 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn.
2026-02-02T15:35:22.032220 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.032220 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.032220 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.032220 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.032726 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.032726 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.032726 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:22.032726 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.032726 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.033731 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58642 (first component not IP)
2026-02-02T15:35:22.033731 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.033731 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58642 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58642
2026-02-02T15:35:22.034730 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58642 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58642
2026-02-02T15:35:22.034730 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.034730 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58642 (first component not IP)
2026-02-02T15:35:22.034730 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.035729 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn - resolvedAddrs: {/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642}
2026-02-02T15:35:22.035729 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642}
2026-02-02T15:35:22.035729 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642}
2026-02-02T15:35:22.035729 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn - Returning: [/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642]
00:52 +904 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.052137 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
00:52 +904 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.058754 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
00:52 +904 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.058754 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4101 (first component not IP)
00:52 +904 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.059754 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.059754 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 677188179, network.listenAddresses: [/ip4/0.0.0.0/tcp/58642]
00:52 +904 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.059754 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
00:52 +904 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.060754 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:22.061754 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn, Host hashCode: 695510913
00:52 +904 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.061754 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4101 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4101
00:52 +904 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.061754 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.061754 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
00:52 +904 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.061754 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4101 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4101
00:52 +904 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.062260 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58642 (first component not IP)
2026-02-02T15:35:22.062260 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.062260 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58642 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58642
2026-02-02T15:35:22.062260 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58642 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58642
2026-02-02T15:35:22.062260 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.062260 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58642 (first component not IP)
2026-02-02T15:35:22.062260 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
00:52 +904 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.063265 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
00:52 +904 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.063265 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn - resolvedAddrs: {/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642}
2026-02-02T15:35:22.063265 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642}
00:52 +904 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.063265 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4101 (first component not IP)
00:52 +904 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.063265 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642}
00:52 +904 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.063265 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.064265 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac - resolvedAddrs: {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:35:22.064265 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:35:22.064265 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:35:22.064265 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac - Returning: [/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101]
00:52 +904 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.066263 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn - Returning: [/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642]
2026-02-02T15:35:22.067264 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn
2026-02-02T15:35:22.067264 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:22.067264 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:22.068263 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn, Host hashCode: 695510913
2026-02-02T15:35:22.068263 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.068263 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.068263 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58642 (first component not IP)
2026-02-02T15:35:22.068263 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.068263 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58642 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58642
2026-02-02T15:35:22.069262 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58642 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58642
2026-02-02T15:35:22.069262 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.070767 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58642 (first component not IP)
2026-02-02T15:35:22.071784 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.071784 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn - resolvedAddrs: {/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642}
2026-02-02T15:35:22.072783 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642}
2026-02-02T15:35:22.072783 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642}
2026-02-02T15:35:22.072783 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn - Returning: [/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642]
2026-02-02T15:35:22.072783 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn
2026-02-02T15:35:22.074783 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:22.074783 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:22.074783 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:22.075782 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.075782 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 677188179, network.listenAddresses: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.075782 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.075782 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 677188179, network.listenAddresses: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.075782 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn
2026-02-02T15:35:22.076782 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:22.076782 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn, Host hashCode: 695510913
2026-02-02T15:35:22.076782 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.076782 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.076782 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58642 (first component not IP)
2026-02-02T15:35:22.076782 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.077782 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58642 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58642
2026-02-02T15:35:22.077782 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58642 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58642
2026-02-02T15:35:22.077782 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.077782 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58642 (first component not IP)
2026-02-02T15:35:22.077782 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.077782 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn - resolvedAddrs: {/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642}
2026-02-02T15:35:22.077782 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642}
2026-02-02T15:35:22.078781 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642}
2026-02-02T15:35:22.078781 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn - Returning: [/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642]
2026-02-02T15:35:22.078781 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58642, /ip4/172.29.112.1/tcp/58642] for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn
2026-02-02T15:35:22.078781 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn
2026-02-02T15:35:22.079781 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.079781 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 677188179, network.listenAddresses: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.079781 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:22.079781 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.079781 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 677188179, network.listenAddresses: [/ip4/0.0.0.0/tcp/58642]
2026-02-02T15:35:22.080781 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:35:22.080781 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:22.080781 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/0 with ID: 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn
2026-02-02T15:35:22.080781 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:22.080781 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already started
2026-02-02T15:35:22.082287 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:22.082287 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:22.082287 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:22.082287 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:22.083292 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:22.083292 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:22.083292 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:22.083292 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
00:52 +905 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
00:52 +905 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.084291 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:35:22.084291 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:22.084291 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:22.084291 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:22.085291 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:22.085291 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:35:22.093085 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already stopped
00:52 +906 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
00:52 +906 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.096108 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:22.096108 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:22.125349 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:22.126831 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:22.127717 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:22.131423 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:22.133723 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.134247 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa - Initial _network.listenAddresses: []
2026-02-02T15:35:22.134768 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa, Host hashCode: 290271833
2026-02-02T15:35:22.136282 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.137794 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.137794 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.138798 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa
2026-02-02T15:35:22.138798 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:22.140303 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:52 +906 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.142314 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
00:52 +906 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.151353 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:35:22.151353 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:22.153352 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:22.155352 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:22.155352 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:22.156355 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:22.157356 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:22.158355 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:22.158355 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:22.158355 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:22.159356 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:35:22.159356 [INFO] [Config] [Config.newNode] for peer 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa: Host created. Listening will be handled by host.start().
2026-02-02T15:35:22.159356 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.159356 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa, network.hashCode: 350413754, initial network.listenAddresses: []
2026-02-02T15:35:22.159356 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:35:22.160355 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/0]. Attempting to listen via _network.listen().
2026-02-02T15:35:22.160355 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:35:22.160355 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/0] for peer 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa
2026-02-02T15:35:22.160355 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:35:22.160355 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/0 for peer 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa
00:52 +906 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.160355 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
00:52 +906 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.160355 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/0 with transport TCPTransport for peer 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa
2026-02-02T15:35:22.160355 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/0 with transport TCPTransport
00:52 +906 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.160355 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 1052772028, network.listenAddresses: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.179224 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:22.180325 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac, Host hashCode: 435296991
2026-02-02T15:35:22.180830 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.180830 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.180830 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4101 (first component not IP)
2026-02-02T15:35:22.180830 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.180830 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4101 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4101
2026-02-02T15:35:22.180830 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4101 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4101
2026-02-02T15:35:22.181839 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.181839 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4101 (first component not IP)
2026-02-02T15:35:22.181839 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.181839 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac - resolvedAddrs: {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:35:22.181839 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:35:22.181839 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:35:22.181839 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac - Returning: [/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101]
2026-02-02T15:35:22.181839 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac
2026-02-02T15:35:22.183210 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:22.183210 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:22.184713 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac, Host hashCode: 435296991
2026-02-02T15:35:22.184713 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.184713 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.185226 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4101 (first component not IP)
2026-02-02T15:35:22.188238 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.191752 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4101 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4101
2026-02-02T15:35:22.191752 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4101 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4101
2026-02-02T15:35:22.191752 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.191752 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4101 (first component not IP)
2026-02-02T15:35:22.192751 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.192751 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac - resolvedAddrs: {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:35:22.196749 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:35:22.196749 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:35:22.197749 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac - Returning: [/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101]
2026-02-02T15:35:22.197749 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac
00:52 +906 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.197749 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/0. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/58643 for peer 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa
2026-02-02T15:35:22.197749 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/0 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/58643
2026-02-02T15:35:22.197749 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/58643. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58643] for peer 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa
2026-02-02T15:35:22.198749 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.198749 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/58643 for peer 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa. This should be resolved to concrete addresses by the host.
2026-02-02T15:35:22.198749 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa
2026-02-02T15:35:22.198749 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/58643
2026-02-02T15:35:22.198749 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa.
2026-02-02T15:35:22.198749 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.198749 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.199750 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
00:52 +906 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.201749 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:22.202748 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
00:52 +906 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.199750 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.206746 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.207497 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.208513 [FINE] [basichost] Attempting to create and persist self signed peer record.
00:52 +906 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.209058 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:22.210089 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.210089 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 1052772028, network.listenAddresses: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.211089 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.211089 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 1052772028, network.listenAddresses: [/ip4/0.0.0.0/tcp/4101]
00:52 +906 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.213087 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.213087 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
00:52 +906 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.213953 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac
00:52 +906 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.213953 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58643 (first component not IP)
2026-02-02T15:35:22.213953 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.215458 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58643 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58643
2026-02-02T15:35:22.215458 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58643 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58643
2026-02-02T15:35:22.215458 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.216477 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58643 (first component not IP)
2026-02-02T15:35:22.216477 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.216982 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa - resolvedAddrs: {/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643}
2026-02-02T15:35:22.216982 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643}
00:52 +906 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.216982 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
00:52 +906 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.216982 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643}
00:52 +906 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.216982 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac, Host hashCode: 435296991
00:52 +906 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.216982 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa - Returning: [/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643]
00:52 +906 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.216982 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.216982 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.217996 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4101 (first component not IP)
2026-02-02T15:35:22.217996 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.217996 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4101 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4101
2026-02-02T15:35:22.217996 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4101 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4101
2026-02-02T15:35:22.218996 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.218996 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4101 (first component not IP)
2026-02-02T15:35:22.218996 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.219996 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac - resolvedAddrs: {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:35:22.219996 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:35:22.219996 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101}
2026-02-02T15:35:22.220995 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac - Returning: [/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101]
2026-02-02T15:35:22.220995 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4101, /ip4/172.29.112.1/tcp/4101] for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac
2026-02-02T15:35:22.220995 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac
2026-02-02T15:35:22.223501 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.223501 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 1052772028, network.listenAddresses: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.224111 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:22.224111 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.224111 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 1052772028, network.listenAddresses: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.226735 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:35:22.226735 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:22.227749 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4101 with ID: 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac
00:53 +906 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.227749 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:22.227749 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.227749 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 350413754, network.listenAddresses: [/ip4/0.0.0.0/tcp/58643]
00:53 +906 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.229755 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
00:53 +906 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.230749 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:22.232255 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa, Host hashCode: 290271833
2026-02-02T15:35:22.232255 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.232255 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.233275 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58643 (first component not IP)
2026-02-02T15:35:22.233275 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.233275 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58643 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58643
2026-02-02T15:35:22.233275 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58643 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58643
2026-02-02T15:35:22.233275 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.234274 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58643 (first component not IP)
2026-02-02T15:35:22.234274 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.234274 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa - resolvedAddrs: {/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643}
2026-02-02T15:35:22.234274 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643}
2026-02-02T15:35:22.234915 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643}
2026-02-02T15:35:22.234915 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa - Returning: [/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643]
2026-02-02T15:35:22.235422 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa
2026-02-02T15:35:22.235422 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:22.236931 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
00:53 +906 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.236931 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
00:53 +906 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.236931 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa, Host hashCode: 290271833
2026-02-02T15:35:22.237936 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.237936 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.237936 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58643 (first component not IP)
2026-02-02T15:35:22.237936 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.237936 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58643 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58643
2026-02-02T15:35:22.238936 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58643 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58643
2026-02-02T15:35:22.238936 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.238936 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58643 (first component not IP)
2026-02-02T15:35:22.238936 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.238936 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa - resolvedAddrs: {/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643}
2026-02-02T15:35:22.238936 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643}
2026-02-02T15:35:22.239935 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643}
2026-02-02T15:35:22.239935 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa - Returning: [/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643]
2026-02-02T15:35:22.239935 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa
2026-02-02T15:35:22.240935 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:22.240935 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:22.240935 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:22.240935 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.241934 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 350413754, network.listenAddresses: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.241934 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.241934 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 350413754, network.listenAddresses: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.241934 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa
2026-02-02T15:35:22.241934 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:22.242934 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa, Host hashCode: 290271833
2026-02-02T15:35:22.242934 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.242934 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.242934 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58643 (first component not IP)
2026-02-02T15:35:22.242934 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.242934 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58643 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58643
2026-02-02T15:35:22.242934 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58643 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58643
2026-02-02T15:35:22.243935 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.243935 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58643 (first component not IP)
2026-02-02T15:35:22.243935 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.243935 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa - resolvedAddrs: {/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643}
2026-02-02T15:35:22.243935 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643}
2026-02-02T15:35:22.243935 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643}
2026-02-02T15:35:22.244933 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa - Returning: [/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643]
2026-02-02T15:35:22.245933 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58643, /ip4/172.29.112.1/tcp/58643] for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa
2026-02-02T15:35:22.247932 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa
2026-02-02T15:35:22.247932 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.247932 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 350413754, network.listenAddresses: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.247932 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:22.247932 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.248932 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 350413754, network.listenAddresses: [/ip4/0.0.0.0/tcp/58643]
2026-02-02T15:35:22.248932 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:35:22.248932 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:22.248932 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/0 with ID: 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa
2026-02-02T15:35:22.248932 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:22.249931 [FINE] [Libp2pRouter] [DEBUG] Connecting to /ip4/127.0.0.1/tcp/4001
2026-02-02T15:35:22.249931 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /ip4/127.0.0.1/tcp/4001
Error: Invalid argument(s): Multiaddress must contain /p2p/<peerId>
Stack trace: null
00:53 +906 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.278918 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:22.281787 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
00:53 +906 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.286813 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:22.287142 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:22.287142 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:22.287142 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:22.287647 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:22.287647 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:22.287647 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:22.287647 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
00:53 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
00:53 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.288970 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:35:22.288970 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:22.288970 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:22.289974 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:22.289974 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:22.289974 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
00:53 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.298086 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:35:22.298086 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:35:22.300596 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:35:22.300596 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
00:53 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.302611 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:22.302611 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:22.308647 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:22.309649 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:22.309649 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:22.310647 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:22.313650 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.314649 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq - Initial _network.listenAddresses: []
2026-02-02T15:35:22.314649 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq, Host hashCode: 689108528
2026-02-02T15:35:22.314649 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.314649 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.315650 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.315650 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq
2026-02-02T15:35:22.315650 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:22.321647 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:53 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.327159 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:35:22.329929 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:22.341915 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:22.344037 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:22.344037 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:22.358243 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:22.358243 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.388080 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.388080 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 103ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:42:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:53 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.389091 [FINE] [basichost] Discovered 2 network interfaces
00:53 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.389091 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 112ms (dial: 105ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:42:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:53 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.389091 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:22.389596 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:22.389596 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:22.389596 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:22.389596 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
00:53 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.389596 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
00:53 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.389596 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:22.389596 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:22.389596 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
00:53 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.389596 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
00:53 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.389596 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
00:53 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.389596 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
00:53 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.389596 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
00:53 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.392130 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:35:22.392130 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
00:53 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.392130 [INFO] [Config] [Config.newNode] for peer 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq: Host created. Listening will be handled by host.start().
00:53 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.392130 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:35:22.393131 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
00:53 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.393131 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.393131 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq, network.hashCode: 1070167489, initial network.listenAddresses: []
00:53 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.393131 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
00:53 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.393131 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:35:22.393636 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/0]. Attempting to listen via _network.listen().
00:53 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.393636 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
00:53 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.393636 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:35:22.393636 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/0] for peer 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq
00:53 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.393636 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
00:53 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.393636 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/0]
00:53 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.393636 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
00:53 +907 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.393636 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/0 for peer 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq
2026-02-02T15:35:22.393636 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/0 with transport TCPTransport for peer 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq
2026-02-02T15:35:22.394640 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/0 with transport TCPTransport
00:53 +907 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.396640 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.396640 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 4ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:42:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:22.397639 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 6ms (dial: 5ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:42:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:22.397639 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:22.397639 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.397639 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:35:22.398855 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:35:22.398855 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:35:22.398855 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:35:22.398855 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:35:22.398855 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:22.400323 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:22.400323 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:22.400828 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.400828 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.401344 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:42:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:22.401344 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:42:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:22.401344 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:22.401344 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.401344 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:35:22.402411 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:35:22.402411 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:35:22.402411 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:35:22.403915 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:35:22.403915 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:22.403915 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:22.403915 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:22.404715 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.404715 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.404715 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:42:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:22.405269 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:42:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:22.405269 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:22.405782 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.408322 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:22.409347 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:22.409347 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:22.410372 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:22.411931 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:22.414821 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
00:53 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage disconnect should handle multiaddress and peerId
00:53 +908 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.441135 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:22.441638 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:22.441638 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:22.441638 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:22.443289 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:35:22.460513 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:22.461514 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:22.467759 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:22.473281 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:22.476631 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:22.479861 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:22.482379 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:22.482379 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:22.484379 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:22.485390 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.486905 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos - Initial _network.listenAddresses: []
2026-02-02T15:35:22.486905 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos, Host hashCode: 72747279
2026-02-02T15:35:22.486905 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.487925 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.487925 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.487925 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:22.487925 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:22.489924 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:53 +908 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.500142 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/0. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/58644 for peer 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq
2026-02-02T15:35:22.500142 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/0 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/58644
2026-02-02T15:35:22.500142 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/58644. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58644] for peer 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq
2026-02-02T15:35:22.501658 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.501658 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/58644 for peer 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq. This should be resolved to concrete addresses by the host.
2026-02-02T15:35:22.501658 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq
2026-02-02T15:35:22.501658 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/58644
2026-02-02T15:35:22.501658 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq.
2026-02-02T15:35:22.501658 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.502663 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.502663 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.502663 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.503664 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.503664 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.503664 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:22.503664 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.505008 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.506462 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58644 (first component not IP)
2026-02-02T15:35:22.506966 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.507485 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58644 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58644
2026-02-02T15:35:22.507842 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58644 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58644
2026-02-02T15:35:22.507842 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.508346 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58644 (first component not IP)
2026-02-02T15:35:22.508346 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.508346 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq - resolvedAddrs: {/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644}
2026-02-02T15:35:22.508346 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644}
2026-02-02T15:35:22.508346 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644}
2026-02-02T15:35:22.508346 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq - Returning: [/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644]
2026-02-02T15:35:22.515298 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:22.515298 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.516336 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 1070167489, network.listenAddresses: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.516336 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:22.516336 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq, Host hashCode: 689108528
2026-02-02T15:35:22.517735 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.517735 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.517735 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58644 (first component not IP)
2026-02-02T15:35:22.517735 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.517735 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58644 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58644
2026-02-02T15:35:22.517735 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58644 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58644
2026-02-02T15:35:22.517735 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.517735 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58644 (first component not IP)
2026-02-02T15:35:22.517735 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.517735 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq - resolvedAddrs: {/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644}
2026-02-02T15:35:22.519133 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644}
2026-02-02T15:35:22.519133 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644}
2026-02-02T15:35:22.519133 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq - Returning: [/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644]
2026-02-02T15:35:22.520166 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq
2026-02-02T15:35:22.520166 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:22.520166 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:22.520166 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq, Host hashCode: 689108528
2026-02-02T15:35:22.520166 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.520166 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.521164 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58644 (first component not IP)
2026-02-02T15:35:22.521164 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.521164 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58644 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58644
2026-02-02T15:35:22.521779 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58644 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58644
2026-02-02T15:35:22.521779 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.521779 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58644 (first component not IP)
2026-02-02T15:35:22.521779 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.522293 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq - resolvedAddrs: {/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644}
2026-02-02T15:35:22.522293 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644}
2026-02-02T15:35:22.522293 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644}
2026-02-02T15:35:22.522293 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq - Returning: [/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644]
2026-02-02T15:35:22.522293 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq
2026-02-02T15:35:22.523306 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:22.523306 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:22.524307 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:22.524307 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.524307 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 1070167489, network.listenAddresses: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.524307 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.524307 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 1070167489, network.listenAddresses: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.524307 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq
2026-02-02T15:35:22.525306 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:22.525306 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq, Host hashCode: 689108528
2026-02-02T15:35:22.525306 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.525306 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.525811 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58644 (first component not IP)
2026-02-02T15:35:22.525811 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.525811 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58644 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58644
2026-02-02T15:35:22.526316 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58644 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58644
2026-02-02T15:35:22.526316 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.526316 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58644 (first component not IP)
2026-02-02T15:35:22.526316 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.526316 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq - resolvedAddrs: {/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644}
2026-02-02T15:35:22.526921 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644}
2026-02-02T15:35:22.526921 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644}
2026-02-02T15:35:22.526921 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq - Returning: [/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644]
2026-02-02T15:35:22.527451 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58644, /ip4/172.29.112.1/tcp/58644] for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq
2026-02-02T15:35:22.527451 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq
2026-02-02T15:35:22.527451 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.527451 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 1070167489, network.listenAddresses: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.527451 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:22.527451 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.527451 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 1070167489, network.listenAddresses: [/ip4/0.0.0.0/tcp/58644]
2026-02-02T15:35:22.527451 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:35:22.527451 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:22.527451 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/0 with ID: 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq
2026-02-02T15:35:22.530968 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:22.531968 [FINE] [Libp2pRouter] [DEBUG] Disconnected from 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2
2026-02-02T15:35:22.532969 [FINE] [Libp2pRouter] [DEBUG] Disconnected from 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2
2026-02-02T15:35:22.534306 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:22.534811 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:22.534811 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:22.535324 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:22.535685 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:22.535685 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:22.535685 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:22.535685 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
00:53 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should connect to another peer
00:53 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.536689 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:35:22.537688 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:22.538089 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:22.538089 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:22.538089 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:22.538596 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:35:22.542153 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:22.542153 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:22.543164 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:22.543164 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:22.546672 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:22.546672 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:22.554245 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:22.554245 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:22.554245 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:22.556091 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:22.556091 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:22.556091 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:22.556091 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:22.556091 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:22.556091 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:22.557111 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:22.557111 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:22.557111 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:22.559621 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.559621 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc - Initial _network.listenAddresses: []
2026-02-02T15:35:22.561015 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.562521 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - Initial _network.listenAddresses: []
2026-02-02T15:35:22.564030 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.564030 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - Initial _network.listenAddresses: []
2026-02-02T15:35:22.565035 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc, Host hashCode: 216700479
2026-02-02T15:35:22.565035 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.565035 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.565035 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.565035 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:22.565035 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:22.566047 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah, Host hashCode: 286780863
2026-02-02T15:35:22.566047 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.566047 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.566047 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.566047 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:22.566047 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:22.567433 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C, Host hashCode: 967916776
2026-02-02T15:35:22.567433 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.568024 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.568024 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.568024 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:22.568024 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:22.569271 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:35:22.569271 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:35:22.569271 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:53 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.721290 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:35:22.721290 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:22.722295 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:22.722295 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:22.722295 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:22.722295 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:22.723308 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:22.723308 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:22.723308 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:22.723308 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:22.723308 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:35:22.723308 [INFO] [Config] [Config.newNode] for peer 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos: Host created. Listening will be handled by host.start().
2026-02-02T15:35:22.724449 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.724449 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos, network.hashCode: 330680058, initial network.listenAddresses: []
2026-02-02T15:35:22.724449 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.724449 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4101]. Attempting to listen via _network.listen().
2026-02-02T15:35:22.725007 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.725007 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4101] for peer 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:22.725007 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:22.725518 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4101 for peer 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:22.725518 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4101 with transport TCPTransport for peer 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:22.725518 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4101 with transport TCPTransport
00:53 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.808538 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:35:22.808538 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:22.809540 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:22.809540 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:22.809540 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:22.810538 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:22.810538 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:22.810538 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:22.810538 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:22.810538 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:22.810538 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:35:22.810538 [INFO] [Config] [Config.newNode] for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc: Host created. Listening will be handled by host.start().
2026-02-02T15:35:22.810538 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.814536 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc, network.hashCode: 506819309, initial network.listenAddresses: []
2026-02-02T15:35:22.814536 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:22.814536 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4501]. Attempting to listen via _network.listen().
2026-02-02T15:35:22.814536 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:22.814536 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4501] for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:22.815537 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:22.815537 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4501 for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:22.815537 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4501 with transport TCPTransport for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:22.815537 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4501 with transport TCPTransport
00:53 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.827533 [FINE] [Swarm] [Swarm listen] Error calling transport.listen() for /ip4/0.0.0.0/tcp/4101: Exception: Failed to bind: SocketException: Failed to create server socket (OS Error: The shared flag to bind() needs to be `true` if binding multiple times on the same (address, port) combination.), address = 0.0.0.0, port = 4101 for peer 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:22.827533 [SEVERE] [Swarm] Error listening on /ip4/0.0.0.0/tcp/4101 with transport Instance of 'TCPTransport': Exception: Failed to bind: SocketException: Failed to create server socket (OS Error: The shared flag to bind() needs to be `true` if binding multiple times on the same (address, port) combination.), address = 0.0.0.0, port = 4101
2026-02-02T15:35:22.827533 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos.
2026-02-02T15:35:22.827533 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.827533 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: []
2026-02-02T15:35:22.828533 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.828533 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: []
2026-02-02T15:35:22.828533 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.828533 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: []
2026-02-02T15:35:22.828533 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:22.829532 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.829532 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.829532 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.829532 [FINE] [basichost] Host has no addresses at the moment of self-record creation; record will reflect this.
00:53 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:22.830531 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:35:22.831531 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:22.831531 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:22.831531 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:22.831531 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:22.831531 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:22.831531 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:22.831531 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:22.832531 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:22.832531 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:22.832531 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:35:22.832531 [INFO] [Config] [Config.newNode] for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah: Host created. Listening will be handled by host.start().
2026-02-02T15:35:22.832531 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.832531 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah, network.hashCode: 1021481531, initial network.listenAddresses: []
2026-02-02T15:35:22.833532 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:22.833532 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4502]. Attempting to listen via _network.listen().
2026-02-02T15:35:22.833532 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:22.833532 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4502] for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:22.833532 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:22.833532 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4502 for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:22.833532 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4502 with transport TCPTransport for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:22.834530 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4502 with transport TCPTransport
2026-02-02T15:35:22.838986 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:35:22.838986 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:22.838986 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:22.839990 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:22.839990 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:22.839990 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:22.839990 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:22.840495 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:22.840495 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:22.840495 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:22.840495 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:35:22.841 [INFO] [Config] [Config.newNode] for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C: Host created. Listening will be handled by host.start().
2026-02-02T15:35:22.841 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.841 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C, network.hashCode: 240782191, initial network.listenAddresses: []
2026-02-02T15:35:22.841 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:22.841 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4503]. Attempting to listen via _network.listen().
2026-02-02T15:35:22.841 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:22.842005 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4503] for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:22.842005 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:22.842005 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4503 for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:22.842005 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4503 with transport TCPTransport for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:22.842510 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4503 with transport TCPTransport
00:53 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:22.843948 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:22.843948 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.843948 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 330680058, network.listenAddresses: []
2026-02-02T15:35:22.845458 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:22.845967 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos, Host hashCode: 72747279
2026-02-02T15:35:22.845967 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.845967 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.845967 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.845967 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:22.847407 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:22.847407 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:22.847912 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos, Host hashCode: 72747279
2026-02-02T15:35:22.847912 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.847912 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.847912 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.847912 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:22.849310 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:22.849310 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:22.849310 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:22.849310 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.849310 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 330680058, network.listenAddresses: []
2026-02-02T15:35:22.849310 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.849310 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 330680058, network.listenAddresses: []
2026-02-02T15:35:22.850814 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:22.850814 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:22.850814 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos, Host hashCode: 72747279
2026-02-02T15:35:22.851381 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.851381 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.851381 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.851381 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:22.851889 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:22.851889 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.851889 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 330680058, network.listenAddresses: []
2026-02-02T15:35:22.851889 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:22.851889 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.851889 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 330680058, network.listenAddresses: []
2026-02-02T15:35:22.852983 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=0, protocols=5
2026-02-02T15:35:22.852983 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:22.852983 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4101 with ID: 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:22.853983 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:35:22.854488 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:22.854488 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:22.855495 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:22.856011 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:35:22.856011 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:35:22.856011 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=0, protocols=6
2026-02-02T15:35:22.856011 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:22.856011 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:22.857028 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:35:22.857028 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:35:22.857533 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:22.857533 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:22.859549 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:22.859549 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.861056 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.861056 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 5ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:52:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:22.861056 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 6ms (dial: 5ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:52:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:22.861056 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:22.862075 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.862075 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:35:22.862075 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:35:22.863582 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:35:22.863582 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:35:22.863582 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:35:22.863582 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:22.863582 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:22.864603 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:22.864603 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.864603 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.865601 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 3ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:52:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:22.865601 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 3ms (dial: 3ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:52:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:22.865601 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:22.865601 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.866600 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:35:22.867429 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:35:22.867429 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:35:22.867429 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:35:22.867429 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:35:22.868859 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:22.868859 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:22.869935 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:22.870448 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.871460 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.871460 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 4ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:52:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:22.872460 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 4ms (dial: 4ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:52:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:22.872460 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:22.872460 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.872965 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:35:22.872965 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:35:22.873969 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:35:22.873969 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:35:22.873969 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:35:22.873969 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:22.873969 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:22.891710 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:22.891710 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.892215 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.892215 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 19ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:52:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:22.892215 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 19ms (dial: 19ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:52:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:22.892215 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:22.893288 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:22.893288 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:22.893288 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:22.894286 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:22.896178 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.898479 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - Initial _network.listenAddresses: []
2026-02-02T15:35:22.898479 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, Host hashCode: 481799235
2026-02-02T15:35:22.899992 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.899992 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:22.899992 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:22.899992 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:22.899992 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:22.901914 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:53 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.000058 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4501. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4501 for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:23.000058 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4501 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4501
2026-02-02T15:35:23.000058 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4501. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4501] for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:23.000058 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.001058 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4501 for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. This should be resolved to concrete addresses by the host.
2026-02-02T15:35:23.001058 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:23.001563 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4501
2026-02-02T15:35:23.002079 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
2026-02-02T15:35:23.002079 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.003082 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.004083 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.004083 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.004083 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.004083 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.004083 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:23.005083 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.005083 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.005083 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4501 (first component not IP)
2026-02-02T15:35:23.006082 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.006082 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4501 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4501
2026-02-02T15:35:23.007081 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4501 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4501
2026-02-02T15:35:23.007081 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.008081 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4501 (first component not IP)
2026-02-02T15:35:23.017077 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.020076 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc - resolvedAddrs: {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:35:23.020076 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:35:23.021077 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:35:23.021077 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc - Returning: [/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501]
2026-02-02T15:35:23.030484 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:23.030484 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.031484 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 506819309, network.listenAddresses: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.032484 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:23.032484 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc, Host hashCode: 216700479
2026-02-02T15:35:23.033484 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.033484 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.033484 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4501 (first component not IP)
2026-02-02T15:35:23.033484 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.033484 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4501 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4501
2026-02-02T15:35:23.033484 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4501 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4501
2026-02-02T15:35:23.033484 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.033484 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4501 (first component not IP)
2026-02-02T15:35:23.034991 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.034991 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc - resolvedAddrs: {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:35:23.034991 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:35:23.034991 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:35:23.034991 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc - Returning: [/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501]
2026-02-02T15:35:23.034991 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:23.035996 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:23.040994 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:23.040994 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc, Host hashCode: 216700479
2026-02-02T15:35:23.040994 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.040994 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.041995 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4501 (first component not IP)
2026-02-02T15:35:23.041995 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.049176 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4501 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4501
2026-02-02T15:35:23.049176 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4501 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4501
2026-02-02T15:35:23.049176 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.049176 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4501 (first component not IP)
2026-02-02T15:35:23.049176 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.050176 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc - resolvedAddrs: {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:35:23.050176 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:35:23.050176 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:35:23.050176 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc - Returning: [/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501]
2026-02-02T15:35:23.050176 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:23.052175 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:23.052175 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:23.052175 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:23.053175 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.053175 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 506819309, network.listenAddresses: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.053175 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.053175 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 506819309, network.listenAddresses: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.053175 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:23.054175 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:23.055174 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc, Host hashCode: 216700479
2026-02-02T15:35:23.055174 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.055174 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.055174 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4501 (first component not IP)
2026-02-02T15:35:23.055174 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.055174 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4501 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4501
2026-02-02T15:35:23.056174 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4501 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4501
2026-02-02T15:35:23.056174 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.056174 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4501 (first component not IP)
2026-02-02T15:35:23.056174 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.057174 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc - resolvedAddrs: {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:35:23.057174 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:35:23.057174 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501}
2026-02-02T15:35:23.057174 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc - Returning: [/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501]
2026-02-02T15:35:23.057174 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4501, /ip4/172.29.112.1/tcp/4501] for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:23.058173 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:23.058678 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.058678 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 506819309, network.listenAddresses: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.058678 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:23.058678 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.058678 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 506819309, network.listenAddresses: [/ip4/0.0.0.0/tcp/4501]
2026-02-02T15:35:23.058678 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:35:23.058678 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:23.059682 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4501 with ID: 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:23.059682 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:23.060568 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
00:53 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.060568 [FINE] [basichost] Discovered 2 network interfaces
00:53 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.061075 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
00:53 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.061075 [FINER] [basichost] Processing interface: Wi-Fi
00:53 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.061075 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
00:53 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.061075 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
00:53 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.061075 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:23.061075 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
00:53 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.061075 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:23.062092 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:23.062092 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:23.063597 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:23.063597 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:23.063597 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:23.063597 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:23.063597 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
00:53 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.064615 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4502. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4502 for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:23.064615 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4502 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4502
00:53 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.064615 [INFO] [Config] [Config.newNode] for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: Host created. Listening will be handled by host.start().
2026-02-02T15:35:23.064615 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
00:53 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.064615 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4502. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4502] for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
00:53 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.064615 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, network.hashCode: 515084704, initial network.listenAddresses: []
2026-02-02T15:35:23.065614 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.065614 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4102]. Attempting to listen via _network.listen().
2026-02-02T15:35:23.065614 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.066614 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4102] for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:23.066614 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.066614 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4102 for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:23.066614 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4102 with transport TCPTransport for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
00:53 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.066614 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4502]
00:53 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.066614 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4102 with transport TCPTransport
00:53 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.066614 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4502 for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah. This should be resolved to concrete addresses by the host.
2026-02-02T15:35:23.066614 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:23.067615 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4502
2026-02-02T15:35:23.067615 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
2026-02-02T15:35:23.067615 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.067615 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.067615 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.067615 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.067615 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.067615 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.067615 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:23.068614 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.068614 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.068614 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:35:23.068614 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.069613 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4502
2026-02-02T15:35:23.069613 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4502
2026-02-02T15:35:23.069613 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.069613 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:35:23.070613 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.071119 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - resolvedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:35:23.071119 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:35:23.071119 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:35:23.072124 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - Returning: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502]
2026-02-02T15:35:23.079122 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:23.079635 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.079635 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 1021481531, network.listenAddresses: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.080713 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:23.080713 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah, Host hashCode: 286780863
2026-02-02T15:35:23.080713 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.080713 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.080713 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:35:23.080713 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.080713 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4502
2026-02-02T15:35:23.080713 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4502
2026-02-02T15:35:23.080713 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.080713 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:35:23.080713 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.080713 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - resolvedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:35:23.080713 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:35:23.080713 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:35:23.082336 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - Returning: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502]
2026-02-02T15:35:23.082336 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:23.082336 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:23.082336 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:23.082336 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah, Host hashCode: 286780863
2026-02-02T15:35:23.082336 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.082336 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.082336 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:35:23.082336 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.083415 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4502
2026-02-02T15:35:23.083415 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4502
2026-02-02T15:35:23.083415 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.083415 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:35:23.085527 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.085527 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - resolvedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:35:23.085527 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:35:23.085527 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:35:23.085527 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - Returning: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502]
2026-02-02T15:35:23.086932 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:23.088437 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:23.088437 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:23.089942 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:23.089942 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.089942 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 1021481531, network.listenAddresses: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.089942 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.089942 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 1021481531, network.listenAddresses: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.091461 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:23.091980 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:23.091980 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah, Host hashCode: 286780863
2026-02-02T15:35:23.091980 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.091980 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.093055 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:35:23.093055 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.093055 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4502
2026-02-02T15:35:23.093055 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4502
2026-02-02T15:35:23.093055 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.094054 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:35:23.094054 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.094559 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - resolvedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:35:23.094559 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:35:23.094559 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:35:23.094559 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - Returning: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502]
2026-02-02T15:35:23.095063 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:23.095063 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:23.095063 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.096078 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 1021481531, network.listenAddresses: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.096078 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:23.096078 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.096078 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 1021481531, network.listenAddresses: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.096078 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:35:23.097078 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:23.097078 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4502 with ID: 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:23.098582 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:23.099586 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:23.099586 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:23.100586 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:35:23.101585 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:23.106585 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:23.111582 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4503. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4503 for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:23.112582 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4503 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4503
2026-02-02T15:35:23.113581 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4503. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4503] for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:23.113581 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.114582 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4503 for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C. This should be resolved to concrete addresses by the host.
2026-02-02T15:35:23.114582 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:23.114582 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4503
2026-02-02T15:35:23.114582 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:23.114582 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.115582 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.115582 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.115582 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.115582 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.115582 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.115582 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:23.115582 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.116581 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.116581 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:35:23.116581 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.117581 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4503
2026-02-02T15:35:23.125578 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4503
2026-02-02T15:35:23.126578 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.126578 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:35:23.126578 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.127194 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - resolvedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:35:23.127194 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:35:23.127194 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:35:23.127844 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - Returning: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503]
2026-02-02T15:35:23.155356 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:23.155356 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.155356 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 240782191, network.listenAddresses: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.156361 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:23.156361 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C, Host hashCode: 967916776
2026-02-02T15:35:23.156361 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
00:53 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.156361 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4102. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4102 for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
00:53 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.157362 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
00:53 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.157362 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4102 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4102
00:53 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.157362 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:35:23.157362 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.157362 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4503
2026-02-02T15:35:23.158360 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4503
2026-02-02T15:35:23.158360 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.159359 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:35:23.159359 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.160360 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - resolvedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:35:23.160360 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:35:23.160360 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:35:23.160360 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - Returning: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503]
2026-02-02T15:35:23.160360 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:23.160360 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:23.161359 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:23.162358 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C, Host hashCode: 967916776
2026-02-02T15:35:23.163358 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.164358 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.164358 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
00:53 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.164358 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4102. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4102] for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
00:53 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.164358 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
00:53 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.164358 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.164358 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4102 for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. This should be resolved to concrete addresses by the host.
2026-02-02T15:35:23.165358 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:23.165358 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4102
2026-02-02T15:35:23.166358 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:23.166358 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.166358 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.166358 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.166358 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.166358 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.167358 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.167358 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:23.167358 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.168010 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.168010 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4102 (first component not IP)
2026-02-02T15:35:23.168010 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.168010 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4102 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4102
2026-02-02T15:35:23.169024 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4102 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4102
00:53 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.164358 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4503
00:53 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.169024 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.169024 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4102 (first component not IP)
2026-02-02T15:35:23.169024 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.169024 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - resolvedAddrs: {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:35:23.169024 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:35:23.169024 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:35:23.169024 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - Returning: [/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102]
00:53 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.169024 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4503
2026-02-02T15:35:23.170529 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.170529 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:35:23.170529 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.170529 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - resolvedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:35:23.171546 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:35:23.171546 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:35:23.171546 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - Returning: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503]
2026-02-02T15:35:23.172545 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:23.177545 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:23.178545 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:23.178545 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:23.178545 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.178545 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 240782191, network.listenAddresses: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.178545 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.179544 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 240782191, network.listenAddresses: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.179544 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:23.180051 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:23.180051 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C, Host hashCode: 967916776
2026-02-02T15:35:23.180051 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.180051 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.181056 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:35:23.181056 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.181056 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4503
2026-02-02T15:35:23.181056 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4503
2026-02-02T15:35:23.182055 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.182055 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:35:23.182055 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.182055 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - resolvedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:35:23.182055 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:35:23.182055 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:35:23.182055 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - Returning: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503]
2026-02-02T15:35:23.183055 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:23.183055 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:23.183055 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.183055 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 240782191, network.listenAddresses: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.183055 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:23.184055 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.184055 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 240782191, network.listenAddresses: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.184055 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:35:23.184055 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:23.184055 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4503 with ID: 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:23.185055 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:23.185055 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /test/broadcast/1.0.0
2026-02-02T15:35:23.185055 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /test/broadcast/1.0.0
2026-02-02T15:35:23.186054 [FINE] [Libp2pRouter] [DEBUG] Connecting to /ip4/127.0.0.1/tcp/4502/p2p/12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:23.187054 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:23.187054 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah, Host hashCode: 286780863
2026-02-02T15:35:23.188054 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.188054 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.188054 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:35:23.188054 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.188054 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4502
2026-02-02T15:35:23.189052 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4502 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4502
2026-02-02T15:35:23.189052 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4502]
2026-02-02T15:35:23.189052 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4502 (first component not IP)
2026-02-02T15:35:23.190053 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.190053 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - resolvedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:35:23.190053 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:35:23.190053 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502}
2026-02-02T15:35:23.191053 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - Returning: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502]
2026-02-02T15:35:23.191053 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4502, /ip4/172.29.112.1/tcp/4502] for host 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:23.191053 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:23.191053 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C, Host hashCode: 967916776
2026-02-02T15:35:23.191053 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.191053 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.192052 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:35:23.192052 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.193051 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4503
2026-02-02T15:35:23.195050 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4503 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4503
2026-02-02T15:35:23.198049 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4503]
2026-02-02T15:35:23.198049 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4503 (first component not IP)
2026-02-02T15:35:23.198049 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.199050 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - resolvedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:35:23.199050 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:35:23.199050 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503}
2026-02-02T15:35:23.199050 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - Returning: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503]
2026-02-02T15:35:23.199050 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4503, /ip4/172.29.112.1/tcp/4503] for host 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:23.201049 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah, existing_conns=0
2026-02-02T15:35:23.202048 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah"
2026-02-02T15:35:23.202048 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:23.202048 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:23.202048 [FINE] [Swarm] Found 0 existing connections for peer ID string: "12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah"
2026-02-02T15:35:23.203049 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah. Dialing.
2026-02-02T15:35:23.205047 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:23.205047 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=4, addrs=2, protocols=7
2026-02-02T15:35:23.205047 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:23.206047 [FINE] [Swarm] Dialing 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:23.206047 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:35:23.206047 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:23.206047 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:23.206047 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:23.206047 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=4, addrs=2, protocols=7
2026-02-02T15:35:23.207047 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:23.207047 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:23.226398 [FINE] [HappyEyeballsDialer] Attempting /ip4/127.0.0.1/tcp/4502 (priority 1)
2026-02-02T15:35:23.227399 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah at /ip4/127.0.0.1/tcp/4502
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.227399 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:23.229398 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.229398 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 515084704, network.listenAddresses: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.231903 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:23.235582 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, Host hashCode: 481799235
2026-02-02T15:35:23.238597 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.240596 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.249127 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4102 (first component not IP)
2026-02-02T15:35:23.250651 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.251738 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4102 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4102
2026-02-02T15:35:23.251738 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4102 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4102
2026-02-02T15:35:23.252854 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.264645 [FINE] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) CREATED. IsServer: true, Direction: Direction.inbound. Socket Local: 0.0.0.0:4502, Socket Remote: 127.0.0.1:58645
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.266645 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4102 (first component not IP)
2026-02-02T15:35:23.268643 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.268643 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - resolvedAddrs: {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.274682 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068123270-5004
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.276188 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.284190 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:23.292500 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(86b9e403) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:23.294499 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(86b9e403) ASYNC WAIT. Requested: null. Buffer: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.302497 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:35:23.304402 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - Returning: [/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102]
2026-02-02T15:35:23.304908 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:23.306459 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:23.306966 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:23.307412 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, Host hashCode: 481799235
2026-02-02T15:35:23.307412 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.307917 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.307917 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4102 (first component not IP)
2026-02-02T15:35:23.308611 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.308611 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4102 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4102
2026-02-02T15:35:23.308611 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4102 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4102
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.308611 [FINE] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) CREATED. IsServer: false, Direction: Direction.outbound. Socket Local: 127.0.0.1:58645, Socket Remote: 127.0.0.1:4502
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.308611 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.308611 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4102 (first component not IP)
2026-02-02T15:35:23.309621 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.309621 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068123308-5467
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.309621 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - resolvedAddrs: {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:35:23.309621 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:35:23.309621 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:35:23.309621 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - Returning: [/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102]
2026-02-02T15:35:23.310621 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.310621 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWGhQjo5ete9t3F5Yv9phGwwvewt5VxPHgreZRtYJ3h6eh
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.311621 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:23.311621 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:23.311621 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:23.312620 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.314628 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 515084704, network.listenAddresses: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.315641 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.315641 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 515084704, network.listenAddresses: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.315641 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:23.316641 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:23.317089 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, Host hashCode: 481799235
2026-02-02T15:35:23.317089 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.317089 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.318093 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4102 (first component not IP)
2026-02-02T15:35:23.318093 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.318093 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4102 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4102
2026-02-02T15:35:23.318093 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4102 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4102
2026-02-02T15:35:23.318093 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.318093 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4102 (first component not IP)
2026-02-02T15:35:23.319092 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:23.319092 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - resolvedAddrs: {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:35:23.319092 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:35:23.319092 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102}
2026-02-02T15:35:23.319092 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - Returning: [/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102]
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.319092 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.320171 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4102, /ip4/172.29.112.1/tcp/4102] for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:23.320171 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:23.321172 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.321172 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 515084704, network.listenAddresses: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.321172 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:23.321172 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.321172 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 515084704, network.listenAddresses: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:23.324980 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:35:23.325493 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:23.325493 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4102 with ID: 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:23.325493 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.326156 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:35:23.326662 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(7f7037f6) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:23.326662 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(7f7037f6) ASYNC WAIT. Requested: null. Buffer: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.326662 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:23.328040 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:23.328552 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:23.329764 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:35:23.330401 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:35:23.331567 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:35:23.331567 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
2026-02-02T15:35:23.331567 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:35:23.331567 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:23.332571 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:23.332571 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:23.332571 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.336266 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:23.336266 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(86b9e403) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.337771 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(86b9e403) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:35:23.340291 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:23.340291 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:23.340291 [FINER] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:23.340291 [FINEST] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:35:23.341296 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:23.341296 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:23.341296 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(bca577c9) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:23.341296 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(bca577c9) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:23.342294 [FINEST] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:23.342294 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(7f7037f6) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.342294 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(7f7037f6) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:35:23.342294 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:35:23.343295 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:35:23.343295 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(e4aa8138) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:23.343295 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(e4aa8138) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:23.343295 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:35:23.346615 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(bca577c9) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.346615 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(bca577c9) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:35:23.346615 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/noise"
2026-02-02T15:35:23.347615 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/noise"
2026-02-02T15:35:23.348614 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/noise". Sending acknowledgment: "/noise".
2026-02-02T15:35:23.349615 [FINER] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:35:23.351053 [FINEST] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:35:23.352093 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/noise".
2026-02-02T15:35:23.352093 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/noise" and its handler.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.352624 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:23.354139 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:23.357669 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:23.358669 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 27ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:53:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:23.358669 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 31ms (dial: 28ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:53:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:23.358669 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:23.358669 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:23.359669 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:35:23.359669 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:35:23.360669 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:35:23.360669 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:35:23.360669 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:35:23.360669 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:23.360669 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:23.360669 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:23.361668 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:23.361668 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:23.361668 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:53:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:23.361668 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 1ms (dial: 1ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:53:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:23.362668 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:23.362668 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:23.362668 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:35:23.363668 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:35:23.363668 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:35:23.363668 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:35:23.363668 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:35:23.363668 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:23.363668 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:23.364668 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:23.364668 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:23.364668 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:23.365668 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:53:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:23.365668 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 3ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:53:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:23.365668 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:23.365668 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:23.366667 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.366667 [FINE] [multistream] [multistreamMuxer - handle] Protocol /noise negotiated. Attempting to set protocol on stream scope and stream itself.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.366667 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:35:23.366667 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:35:23.367667 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:35:23.367667 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.367667 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /noise on stream scope and stream. Proceeding to call handler.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.367667 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:23.367667 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:23.368666 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:23.368666 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:23.368666 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:23.368666 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 1ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:53:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:23.369666 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:53:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:23.369666 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:23.370667 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:23.371172 [FINE] [Libp2pRouter] [DEBUG] Connecting to /ip4/127.0.0.1/tcp/4102/p2p/12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:23.372176 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, existing_conns=0
2026-02-02T15:35:23.372713 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw"
2026-02-02T15:35:23.372713 [FINE] [Swarm] Found 0 existing connections for peer ID string: "12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw"
2026-02-02T15:35:23.373219 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. Dialing.
2026-02-02T15:35:23.393196 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:23.394195 [FINE] [Swarm] Dialing 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:23.394195 [FINE] [HappyEyeballsDialer] Attempting /ip4/127.0.0.1/tcp/4102 (priority 1)
2026-02-02T15:35:23.394195 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw at /ip4/127.0.0.1/tcp/4102
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.431029 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(abae4a2c) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.431029 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(abae4a2c) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:23.431535 [FINEST] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:35:23.431535 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(e4aa8138) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.431535 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(e4aa8138) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:35:23.444290 [INFO] [NoiseProtocol] secureOutbound: Writing msg1 (e): 32 bytes
2026-02-02T15:35:23.444290 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 34 bytes: 00205e59b1dc59569f65a11e6a8956e751f0dd152e6f66a28e4b91cbcd132e785d61
2026-02-02T15:35:23.445456 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 34 bytes successfully. Data preview (hex): 00205e59b1dc59569f65a11e6a8956e751f0dd15...
2026-02-02T15:35:23.445456 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(ce0e77d8) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.445456 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(ce0e77d8) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:23.456969 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (34 bytes): 00205e59b1dc59569f65a11e6a8956e751f0dd152e6f66a28e4b91cbcd132e785d61
2026-02-02T15:35:23.457967 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(abae4a2c) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.457967 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(abae4a2c) END (from buffer). Returning 2 bytes: 0020. Buffer after: 32 bytes: 5e59b1dc59569f65a11e6a8956e751f0dd152e6f66a28e4b91cbcd132e785d61
2026-02-02T15:35:23.457967 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(47603900) START. Requested: 32. Buffer: 32 bytes.
2026-02-02T15:35:23.457967 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(47603900) END (from buffer). Returning 32 bytes: 5e59b1dc59569f65a11e6a8956e751f0dd152e6f66a28e4b91cbcd132e785d61. Buffer after: 0 bytes: 
2026-02-02T15:35:23.457967 [INFO] [NoiseProtocol] secureInbound: Read msg1 (e): 32 bytes
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.506152 [FINE] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) CREATED. IsServer: true, Direction: Direction.inbound. Socket Local: 0.0.0.0:4102, Socket Remote: 127.0.0.1:58646
2026-02-02T15:35:23.511130 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068123510-6517
2026-02-02T15:35:23.520813 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:23.527834 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(db728a94) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:23.528833 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(db728a94) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:23.544158 [FINE] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) CREATED. IsServer: false, Direction: Direction.outbound. Socket Local: 127.0.0.1:58646, Socket Remote: 127.0.0.1:4102
2026-02-02T15:35:23.545084 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068123545-539
2026-02-02T15:35:23.547088 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWJpE8aTohHBZrPGp3fMKaP7Xqd83kGQTfLYeKZznESQws
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.552105 [INFO] [NoiseProtocol] secureInbound: Writing msg2 (e,ee,s,es + payload): 200 bytes
2026-02-02T15:35:23.552105 [FINER] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Writing 202 bytes: 00c81ed07c883962dca130f8ee6a2a1e5f0d70c10ea7361828bea4185aaf6208e8309ca90346854225374f608b65d247600d56c01a1ecf552a7cad1eec9ae7424ae758930f45feabc77060c29097e8d6bd81ef0b50bdd282f8110afa00e992ed435bf61da44dcfa267da61dfbc4ab71eb94fd8919bf1adb5d86b4696278607bf132e0175dd3121fb569a745ca4131f43763f10a22711a55307b96f093955ee5f472b5ad90fb3e8b3e51cec18f5ed744a7c1a929197491dd26ce03490507bed4447af7282924a445ba46c
2026-02-02T15:35:23.552105 [FINEST] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Flushed 202 bytes successfully. Data preview (hex): 00c81ed07c883962dca130f8ee6a2a1e5f0d70c1...
2026-02-02T15:35:23.554110 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(12c8dc52) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.554110 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(12c8dc52) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:23.561113 [FINEST] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - RAW_SOCKET_DATA_CHUNK_RECV (202 bytes): 00c81ed07c883962dca130f8ee6a2a1e5f0d70c10ea7361828bea4185aaf6208e8309ca90346854225374f608b65d247600d56c01a1ecf552a7cad1eec9ae7424ae758930f45feabc77060c29097e8d6bd81ef0b50bdd282f8110afa00e992ed435bf61da44dcfa267da61dfbc4ab71eb94fd8919bf1adb5d86b4696278607bf132e0175dd3121fb569a745ca4131f43763f10a22711a55307b96f093955ee5f472b5ad90fb3e8b3e51cec18f5ed744a7c1a929197491dd26ce03490507bed4447af7282924a445ba46c
2026-02-02T15:35:23.561113 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(ce0e77d8) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.563112 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(ce0e77d8) END (from buffer). Returning 2 bytes: 00c8. Buffer after: 200 bytes: 1ed07c883962dca130f8ee6a2a1e5f0d70c10ea7361828bea4185aaf6208e8309ca90346854225374f608b65d247600d56c01a1ecf552a7cad1eec9ae7424ae758930f45feabc77060c29097e8d6bd81ef0b50bdd282f8110afa00e992ed435bf61da44dcfa267da61dfbc4ab71eb94fd8919bf1adb5d86b4696278607bf132e0175dd3121fb569a745ca4131f43763f10a22711a55307b96f093955ee5f472b5ad90fb3e8b3e51cec18f5ed744a7c1a929197491dd26ce03490507bed4447af7282924a445ba46c
2026-02-02T15:35:23.563112 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(2fff950d) START. Requested: 200. Buffer: 200 bytes.
2026-02-02T15:35:23.563112 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(2fff950d) END (from buffer). Returning 200 bytes: 1ed07c883962dca130f8ee6a2a1e5f0d70c10ea7361828bea4185aaf6208e8309ca90346854225374f608b65d247600d56c01a1ecf552a7cad1eec9ae7424ae758930f45feabc77060c29097e8d6bd81ef0b50bdd282f8110afa00e992ed435bf61da44dcfa267da61dfbc4ab71eb94fd8919bf1adb5d86b4696278607bf132e0175dd3121fb569a745ca4131f43763f10a22711a55307b96f093955ee5f472b5ad90fb3e8b3e51cec18f5ed744a7c1a929197491dd26ce03490507bed4447af7282924a445ba46c. Buffer after: 0 bytes: 
2026-02-02T15:35:23.563112 [INFO] [NoiseProtocol] secureOutbound: Read msg2: 200 bytes
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.576255 [FINER] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:23.583597 [FINEST] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:35:23.584596 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(2091ad65) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:23.584596 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(2091ad65) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:23.594659 [FINEST] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:23.594659 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(db728a94) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.594659 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(db728a94) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:35:23.600323 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:23.600827 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:23.600827 [FINER] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:23.601940 [FINEST] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:23.601940 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(2091ad65) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.602997 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(2091ad65) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:35:23.602997 [FINER] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:35:23.604505 [FINEST] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:35:23.604505 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(0191d4ac) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:23.604505 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(0191d4ac) ASYNC WAIT. Requested: null. Buffer: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.604505 [INFO] [NoiseProtocol] secureOutbound: Writing msg3 (s,se + payload): 168 bytes
2026-02-02T15:35:23.604505 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 170 bytes: 00a88f26345a4ee201ac74d52eb36075f6ffabd11221712703c791a432490103dc750e91b3ef01d7af7e5a2622460fb09d6a46b41352fcffad55b7700fa4d78a48e7c2a37dc6478fe18ec6172f26573f9661809d98ab07973bd5fbe07021b2b34d9a746364d77b9e7ea307091218adea69992cc3d3dcbba037bae31d13e354167c41957453b471e62ae7aaef29126b9120f1494470bc72ec89961d20e3ac5f604aea105c3f886e8af65b
2026-02-02T15:35:23.606012 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 170 bytes successfully. Data preview (hex): 00a88f26345a4ee201ac74d52eb36075f6ffabd1...
2026-02-02T15:35:23.606012 [INFO] [NoiseProtocol] secureOutbound: Handshake complete. Remote peer: 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.608035 [FINEST] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.608542 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah, initialSendNonce=0, initialRecvNonce=0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.608542 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:23.608542 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:23.608542 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(16159715) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:23.608542 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(16159715) ASYNC WAIT. Requested: null. Buffer: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.608542 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1064635575
2026-02-02T15:35:23.608542 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1059730016
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.608542 [FINEST] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:35:23.609547 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(16159715) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.609547 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(16159715) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:35:23.609547 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/noise"
2026-02-02T15:35:23.609547 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/noise"
2026-02-02T15:35:23.610548 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/noise". Sending acknowledgment: "/noise".
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.610548 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.610548 [FINER] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Writing 8 bytes: 072f6e6f6973650a
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.610548 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [10, 32, 200, 192, 148, 10, 84, 24, 166, 217, 78, 62, 33, 82, 238, 247, 120, 174, 240, 98, 43, 63, 125, 98, 100, 221, 181, 185, 93, 226, 221, 227]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.611546 [FINEST] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:35:23.611546 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/noise".
2026-02-02T15:35:23.611546 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/noise" and its handler.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.612547 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.614051 [FINE] [multistream] [multistreamMuxer - handle] Protocol /noise negotiated. Attempting to set protocol on stream scope and stream itself.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.614051 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:35:23.614556 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:35:23.614556 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:35:23.614556 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 38 bytes: 00249614fba262e4a5fe50d269eafa67ad2b861df9b813cfc573a06957af19118aa4b884e6fe
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.614556 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /noise on stream scope and stream. Proceeding to call handler.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.615570 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 38 bytes successfully. Data preview (hex): 00249614fba262e4a5fe50d269eafa67ad2b861d...
2026-02-02T15:35:23.616484 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:23.617535 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.617535 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.617535 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.617535 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:23.618570 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:23.620570 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:23.621569 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:23.622568 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(59ac193c) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.622568 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(59ac193c) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:23.623074 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (208 bytes): 00a88f26345a4ee201ac74d52eb36075f6ffabd11221712703c791a432490103dc750e91b3ef01d7af7e5a2622460fb09d6a46b41352fcffad55b7700fa4d78a48e7c2a37dc6478fe18ec6172f26573f9661809d98ab07973bd5fbe07021b2b34d9a746364d77b9e7ea307091218adea69992cc3d3dcbba037bae31d13e354167c41957453b471e62ae7aaef29126b9120f1494470bc72ec89961d20e3ac5f604aea105c3f886e8af65b00249614fba262e4a5fe50d269eafa67ad2b861df9b813cfc573a06957af19118aa4b884e6fe
2026-02-02T15:35:23.623074 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(12c8dc52) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.623074 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(12c8dc52) END (from buffer). Returning 2 bytes: 00a8. Buffer after: 206 bytes: 8f26345a4ee201ac74d52eb36075f6ffabd11221712703c791a432490103dc750e91b3ef01d7af7e5a2622460fb09d6a46b41352fcffad55b7700fa4d78a48e7c2a37dc6478fe18ec6172f26573f9661809d98ab07973bd5fbe07021b2b34d9a746364d77b9e7ea307091218adea69992cc3d3dcbba037bae31d13e354167c41957453b471e62ae7aaef29126b9120f1494470bc72ec89961d20e3ac5f604aea105c3f886e8af65b00249614fba262e4a5fe50d269eafa67ad2b861df9b813cfc573a06957af19118aa4b884e6fe
2026-02-02T15:35:23.624078 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(14325416) START. Requested: 168. Buffer: 206 bytes.
2026-02-02T15:35:23.624078 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(14325416) END (from buffer). Returning 168 bytes: 8f26345a4ee201ac74d52eb36075f6ffabd11221712703c791a432490103dc750e91b3ef01d7af7e5a2622460fb09d6a46b41352fcffad55b7700fa4d78a48e7c2a37dc6478fe18ec6172f26573f9661809d98ab07973bd5fbe07021b2b34d9a746364d77b9e7ea307091218adea69992cc3d3dcbba037bae31d13e354167c41957453b471e62ae7aaef29126b9120f1494470bc72ec89961d20e3ac5f604aea105c3f886e8af65b. Buffer after: 38 bytes: 00249614fba262e4a5fe50d269eafa67ad2b861df9b813cfc573a06957af19118aa4b884e6fe
2026-02-02T15:35:23.624078 [INFO] [NoiseProtocol] secureInbound: Read msg3: 168 bytes
2026-02-02T15:35:23.633729 [INFO] [NoiseProtocol] secureInbound: Handshake complete. Remote peer: 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:23.634728 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:35:23.635232 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1059730016
2026-02-02T15:35:23.635232 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1064635575
2026-02-02T15:35:23.635232 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:23.635232 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:23.637245 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.638245 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.639245 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [10, 32, 200, 192, 148, 10, 84, 24, 166, 217, 78, 62, 33, 82, 238, 247, 120, 174, 240, 98, 43, 63, 125, 98, 100, 221, 181, 185, 93, 226, 221, 227]
2026-02-02T15:35:23.639245 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
2026-02-02T15:35:23.639245 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.639245 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:23.640751 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:23.640751 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:23.641256 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:23.641256 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(b918cf9a) START. Requested: 2. Buffer: 38 bytes.
2026-02-02T15:35:23.641256 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(b918cf9a) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 9614fba262e4a5fe50d269eafa67ad2b861df9b813cfc573a06957af19118aa4b884e6fe
2026-02-02T15:35:23.641256 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:35:23.642261 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:23.642766 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:35:23.642766 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:35:23.642766 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:35:23.642766 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:35:23.642766 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:35:23.642766 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(d05e9b7e) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:35:23.642766 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(d05e9b7e) END (from buffer). Returning 36 bytes: 9614fba262e4a5fe50d269eafa67ad2b861df9b813cfc573a06957af19118aa4b884e6fe. Buffer after: 0 bytes: 
2026-02-02T15:35:23.642766 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [150, 20, 251, 162]
2026-02-02T15:35:23.642766 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:35:23.642766 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 9614fba262e4a5fe50d269eafa67ad2b861df9b813cfc573a06957af19118aa4b884e6fe
2026-02-02T15:35:23.642766 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:35:23.642766 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:35:23.644306 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 9614fba262e4a5fe50d269eafa67ad2b861df9b8
2026-02-02T15:35:23.644306 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 13cfc573a06957af19118aa4b884e6fe
2026-02-02T15:35:23.644306 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [150, 20, 251, 162]
2026-02-02T15:35:23.644306 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [19, 207, 197, 115]
2026-02-02T15:35:23.644948 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [19, 207, 197, 115, 160, 105, 87, 175, 25, 17, 138, 164, 184, 132, 230, 254]
2026-02-02T15:35:23.644948 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:23.644948 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064635575): [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.644948 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(84e50d51) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.644948 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(84e50d51) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:23.646452 [FINEST] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:35:23.646452 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(0191d4ac) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.646452 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(0191d4ac) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.646452 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:35:23.650095 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:23.650095 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:23.650095 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:23.650095 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:23.650095 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:23.650095 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:23.651732 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:35:23.651732 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:35:23.651732 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.657247 [INFO] [NoiseProtocol] secureOutbound: Writing msg1 (e): 32 bytes
2026-02-02T15:35:23.658246 [FINER] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Writing 34 bytes: 00207a2fc69aa41766eb439911f7b837951b400cc83bcda2414a67332bb333168f60
2026-02-02T15:35:23.658246 [FINEST] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Flushed 34 bytes successfully. Data preview (hex): 00207a2fc69aa41766eb439911f7b837951b400c...
2026-02-02T15:35:23.659246 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(c8f4ee82) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.659246 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(c8f4ee82) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:23.660246 [FINEST] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - RAW_SOCKET_DATA_CHUNK_RECV (34 bytes): 00207a2fc69aa41766eb439911f7b837951b400cc83bcda2414a67332bb333168f60
2026-02-02T15:35:23.660246 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(84e50d51) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.660246 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(84e50d51) END (from buffer). Returning 2 bytes: 0020. Buffer after: 32 bytes: 7a2fc69aa41766eb439911f7b837951b400cc83bcda2414a67332bb333168f60
2026-02-02T15:35:23.660246 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(73e36021) START. Requested: 32. Buffer: 32 bytes.
2026-02-02T15:35:23.661245 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(73e36021) END (from buffer). Returning 32 bytes: 7a2fc69aa41766eb439911f7b837951b400cc83bcda2414a67332bb333168f60. Buffer after: 0 bytes: 
2026-02-02T15:35:23.661245 [INFO] [NoiseProtocol] secureInbound: Read msg1 (e): 32 bytes
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.654243 [FINER] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Writing 38 bytes: 0024619eb21f99ded2e47264e433d6930b82e281e641f9d558119c47ca6327b1132f261dc9cc
2026-02-02T15:35:23.672784 [FINEST] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Flushed 38 bytes successfully. Data preview (hex): 0024619eb21f99ded2e47264e433d6930b82e281...
2026-02-02T15:35:23.672784 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:23.673796 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:23.674627 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:23.674627 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.677684 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.684192 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.684192 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:23.684192 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:23.684192 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:23.684192 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:23.684192 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(072e4e37) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.685192 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(072e4e37) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:23.690821 [FINEST] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 0024619eb21f99ded2e47264e433d6930b82e281e641f9d558119c47ca6327b1132f261dc9cc
2026-02-02T15:35:23.690821 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(59ac193c) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.690821 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(59ac193c) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 619eb21f99ded2e47264e433d6930b82e281e641f9d558119c47ca6327b1132f261dc9cc
2026-02-02T15:35:23.690821 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:35:23.691833 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:23.691833 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:35:23.691833 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:35:23.691833 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:35:23.691833 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:35:23.691833 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:35:23.691833 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(206d9086) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:35:23.691833 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(206d9086) END (from buffer). Returning 36 bytes: 619eb21f99ded2e47264e433d6930b82e281e641f9d558119c47ca6327b1132f261dc9cc. Buffer after: 0 bytes: 
2026-02-02T15:35:23.691833 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [97, 158, 178, 31]
2026-02-02T15:35:23.692833 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:35:23.692833 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 619eb21f99ded2e47264e433d6930b82e281e641f9d558119c47ca6327b1132f261dc9cc
2026-02-02T15:35:23.692833 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:35:23.692833 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:35:23.692833 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 619eb21f99ded2e47264e433d6930b82e281e641
2026-02-02T15:35:23.692833 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: f9d558119c47ca6327b1132f261dc9cc
2026-02-02T15:35:23.692833 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [97, 158, 178, 31]
2026-02-02T15:35:23.692833 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [249, 213, 88, 17]
2026-02-02T15:35:23.692833 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [249, 213, 88, 17, 156, 71, 202, 99, 39, 177, 19, 47, 38, 29, 201, 204]
2026-02-02T15:35:23.723333 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:23.724333 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059730016): [10, 32, 200, 192, 148, 10, 84, 24, 166, 217, 78, 62, 33, 82, 238, 247, 120, 174, 240, 98, 43, 63, 125, 98, 100, 221, 181, 185, 93, 226, 221, 227]
2026-02-02T15:35:23.724333 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:35:23.724333 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:23.724333 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:23.724333 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:23.726154 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:23.726660 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:35:23.726660 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:35:23.726660 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:35:23.727664 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 32 bytes: 001e2497422a83da318663d1c1a7aae40df147d6be8260d1d89aef7d1f6206cc
2026-02-02T15:35:23.733589 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e2497422a83da318663d1c1a7aae40df147d6be8260d1d89aef7d1f6206cc
2026-02-02T15:35:23.734107 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(072e4e37) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.734107 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(072e4e37) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 2497422a83da318663d1c1a7aae40df147d6be8260d1d89aef7d1f6206cc
2026-02-02T15:35:23.734107 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:35:23.734627 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:23.734627 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:35:23.734627 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:35:23.734627 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:35:23.734627 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:35:23.734627 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:35:23.734627 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(e2712a3b) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:35:23.734627 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(e2712a3b) END (from buffer). Returning 30 bytes: 2497422a83da318663d1c1a7aae40df147d6be8260d1d89aef7d1f6206cc. Buffer after: 0 bytes: 
2026-02-02T15:35:23.734627 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [36, 151, 66, 42]
2026-02-02T15:35:23.734627 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:35:23.735632 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 2497422a83da318663d1c1a7aae40df147d6be8260d1d89aef7d1f6206cc
2026-02-02T15:35:23.735632 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:35:23.735632 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:35:23.735632 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 2497422a83da318663d1c1a7aae4
2026-02-02T15:35:23.735632 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 0df147d6be8260d1d89aef7d1f6206cc
2026-02-02T15:35:23.735632 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [36, 151, 66, 42]
2026-02-02T15:35:23.736136 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [13, 241, 71, 214]
2026-02-02T15:35:23.736136 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [13, 241, 71, 214, 190, 130, 96, 209, 216, 154, 239, 125, 31, 98, 6, 204]
2026-02-02T15:35:23.736136 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:23.737141 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064635575): [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
2026-02-02T15:35:23.737141 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:35:23.737141 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:23.737141 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:23.737141 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:23.738646 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/yamux/1.0.0"
2026-02-02T15:35:23.738646 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/yamux/1.0.0"
2026-02-02T15:35:23.738646 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/yamux/1.0.0". Sending acknowledgment: "/yamux/1.0.0".
2026-02-02T15:35:23.738646 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:23.738646 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:35:23.739650 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:35:23.740650 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:35:23.741650 [FINER] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Writing 32 bytes: 001eeb45a1f5ecce43daa00a696bc946765ea9d104a4b34dcfa2888ca69c857f
2026-02-02T15:35:23.743649 [FINEST] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Flushed 32 bytes successfully. Data preview (hex): 001eeb45a1f5ecce43daa00a696bc946765ea9d1...
2026-02-02T15:35:23.743649 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/yamux/1.0.0".
2026-02-02T15:35:23.744648 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/yamux/1.0.0" and its handler.
2026-02-02T15:35:23.744648 [FINE] [multistream] [multistreamMuxer - handle] Protocol /yamux/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:23.744648 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /yamux/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:35:23.761158 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:23.762189 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068123762-5004
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.763695 [INFO] [NoiseProtocol] secureInbound: Writing msg2 (e,ee,s,es + payload): 200 bytes
2026-02-02T15:35:23.763695 [FINER] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Writing 202 bytes: 00c8845e7a78cce36630a74167a8072ecf79ddfc27cf7afdbdf5c5e941e86b12197c9838ade0d6412f8df74e104f3fd7fae0a6090c40112807899db1d3610c8f0a20acb2a6efcf44f92a25a7b5d817919fc42067215d564e908f3863d890c2d9e191701b6b4cf8e8363fd6fc11e9a4c0e627ee9835f060ee0981a3d5f54ef1a54acc4dd329e5c7b342f7b2c45f440d092ac36a5d8f1b44f00aae5a02c8107d083091ff6da8962a584cef480e985d4cb88466a8488897687e34fb0db258fd18e1c89ccea4e121abdce6fa
2026-02-02T15:35:23.764700 [FINEST] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Flushed 202 bytes successfully. Data preview (hex): 00c8845e7a78cce36630a74167a8072ecf79ddfc...
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.764700 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.764700 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(32664b1f) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.764700 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(32664b1f) ASYNC WAIT. Requested: 2. Buffer: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.765715 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:35:23.765715 [FINE] [SwarmConn] SwarmConn (0): Context set: b3875d58-0d34-4093-86c9-91083384aeee
2026-02-02T15:35:23.766714 [FINE] [Swarm] Storing inbound connection for peer=12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc, conn_id=0
2026-02-02T15:35:23.768218 [FINE] [Swarm] Connection stored. Total connections for "12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc": 1
2026-02-02T15:35:23.773 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. Conn ID: 0, Direction: Direction.inbound
2026-02-02T15:35:23.774014 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.775013 [FINEST] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - RAW_SOCKET_DATA_CHUNK_RECV (202 bytes): 00c8845e7a78cce36630a74167a8072ecf79ddfc27cf7afdbdf5c5e941e86b12197c9838ade0d6412f8df74e104f3fd7fae0a6090c40112807899db1d3610c8f0a20acb2a6efcf44f92a25a7b5d817919fc42067215d564e908f3863d890c2d9e191701b6b4cf8e8363fd6fc11e9a4c0e627ee9835f060ee0981a3d5f54ef1a54acc4dd329e5c7b342f7b2c45f440d092ac36a5d8f1b44f00aae5a02c8107d083091ff6da8962a584cef480e985d4cb88466a8488897687e34fb0db258fd18e1c89ccea4e121abdce6fa
2026-02-02T15:35:23.775013 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(c8f4ee82) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.775519 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(c8f4ee82) END (from buffer). Returning 2 bytes: 00c8. Buffer after: 200 bytes: 845e7a78cce36630a74167a8072ecf79ddfc27cf7afdbdf5c5e941e86b12197c9838ade0d6412f8df74e104f3fd7fae0a6090c40112807899db1d3610c8f0a20acb2a6efcf44f92a25a7b5d817919fc42067215d564e908f3863d890c2d9e191701b6b4cf8e8363fd6fc11e9a4c0e627ee9835f060ee0981a3d5f54ef1a54acc4dd329e5c7b342f7b2c45f440d092ac36a5d8f1b44f00aae5a02c8107d083091ff6da8962a584cef480e985d4cb88466a8488897687e34fb0db258fd18e1c89ccea4e121abdce6fa
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.775519 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. Conn ID: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.775519 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(73967fe0) START. Requested: 200. Buffer: 200 bytes.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.775519 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.775519 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(73967fe0) END (from buffer). Returning 200 bytes: 845e7a78cce36630a74167a8072ecf79ddfc27cf7afdbdf5c5e941e86b12197c9838ade0d6412f8df74e104f3fd7fae0a6090c40112807899db1d3610c8f0a20acb2a6efcf44f92a25a7b5d817919fc42067215d564e908f3863d890c2d9e191701b6b4cf8e8363fd6fc11e9a4c0e627ee9835f060ee0981a3d5f54ef1a54acc4dd329e5c7b342f7b2c45f440d092ac36a5d8f1b44f00aae5a02c8107d083091ff6da8962a584cef480e985d4cb88466a8488897687e34fb0db258fd18e1c89ccea4e121abdce6fa. Buffer after: 0 bytes: 
2026-02-02T15:35:23.775519 [INFO] [NoiseProtocol] secureOutbound: Read msg2: 200 bytes
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.775519 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
2026-02-02T15:35:23.777289 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:23.778293 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Inbound connection from 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. This peer is the LISTENER - waiting for remote to initiate identify protocol.
2026-02-02T15:35:23.781939 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 32 bytes successfully. Data preview (hex): 001e2497422a83da318663d1c1a7aae40df147d6...
2026-02-02T15:35:23.781939 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:23.781939 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.781939 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.783219 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.783219 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:23.783219 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:23.783219 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:23.783219 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:23.783219 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(6d7c7ef9) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.783219 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(6d7c7ef9) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:23.784727 [FINEST] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001eeb45a1f5ecce43daa00a696bc946765ea9d104a4b34dcfa2888ca69c857f
2026-02-02T15:35:23.785245 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(6d7c7ef9) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.785723 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(6d7c7ef9) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: eb45a1f5ecce43daa00a696bc946765ea9d104a4b34dcfa2888ca69c857f
2026-02-02T15:35:23.785723 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:35:23.785723 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:23.785723 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:35:23.785723 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:35:23.785723 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:35:23.788232 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:35:23.788232 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:35:23.788232 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(e099b6fe) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:35:23.788969 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(e099b6fe) END (from buffer). Returning 30 bytes: eb45a1f5ecce43daa00a696bc946765ea9d104a4b34dcfa2888ca69c857f. Buffer after: 0 bytes: 
2026-02-02T15:35:23.788969 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [235, 69, 161, 245]
2026-02-02T15:35:23.788969 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:35:23.788969 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: eb45a1f5ecce43daa00a696bc946765ea9d104a4b34dcfa2888ca69c857f
2026-02-02T15:35:23.788969 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:35:23.789973 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:35:23.789973 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: eb45a1f5ecce43daa00a696bc946
2026-02-02T15:35:23.789973 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 765ea9d104a4b34dcfa2888ca69c857f
2026-02-02T15:35:23.789973 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [235, 69, 161, 245]
2026-02-02T15:35:23.790479 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [118, 94, 169, 209]
2026-02-02T15:35:23.790479 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [118, 94, 169, 209, 4, 164, 179, 77, 207, 162, 136, 140, 166, 156, 133, 127]
2026-02-02T15:35:23.790479 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:23.790479 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059730016): [10, 32, 200, 192, 148, 10, 84, 24, 166, 217, 78, 62, 33, 82, 238, 247, 120, 174, 240, 98, 43, 63, 125, 98, 100, 221, 181, 185, 93, 226, 221, 227]
2026-02-02T15:35:23.790479 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:35:23.790479 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:23.791482 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:23.791482 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:23.791482 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:23.796753 [FINE] [Swarm] Swarm._dialSingleAddr: Successfully dialed and upgraded connection to 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah at /ip4/127.0.0.1/tcp/4502
2026-02-02T15:35:23.797758 [FINE] [HappyEyeballsDialer] Connected via /ip4/127.0.0.1/tcp/4502
2026-02-02T15:35:23.798773 [FINE] [Swarm] Swarm.dialPeer: Successfully connected to 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:23.798773 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068123798-5467
2026-02-02T15:35:23.799773 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:23.799773 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:35:23.799773 [FINE] [SwarmConn] SwarmConn (0): Context set: c5209782-943e-4fb8-9c05-3588c75bb153
2026-02-02T15:35:23.799773 [INFO] [Swarm] Swarm.dialPeer: Dial latency for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah: 593ms
2026-02-02T15:35:23.801392 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:23.801392 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.802909 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.804927 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.805925 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:23.806430 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:23.806838 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:23.807343 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:23.807343 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:23.807855 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(0c7ebe85) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.807855 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(0c7ebe85) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:23.809868 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:23.810868 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.810868 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.811921 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.811921 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:23.811921 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:23.813426 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:23.813426 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:23.813426 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:23.813426 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(65b631f3) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.813426 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(65b631f3) ASYNC WAIT. Requested: 2. Buffer: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.814445 [INFO] [NoiseProtocol] secureOutbound: Writing msg3 (s,se + payload): 168 bytes
2026-02-02T15:35:23.814445 [FINER] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Writing 170 bytes: 00a8f642ee27c008b24b8cc042c7a416227c23c3a3557c8b287239e1d9d9beb8ac97b4be1010ef17f797ef1e6fea1ab083400280e4cbb79786ab7bb6e369667bd0c767149a584e1174548f6de296a7a4903f5639f7fd697f955663239618bdc4fae22e31d8a1518291117c6116728b9cca1ee9683057ef01e494fde584e96539e4d5d7b263c85204a4856902ab43e4a09081a338545b60435c03a4c8952d057005c92d3f5b55267d26ee
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.814445 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah. Conn ID: 0, Direction: Direction.outbound
2026-02-02T15:35:23.815950 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
2026-02-02T15:35:23.815950 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah. Conn ID: 0
2026-02-02T15:35:23.815950 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.815950 [FINEST] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - RAW_SOCKET_DATA_CHUNK_RECV (170 bytes): 00a8f642ee27c008b24b8cc042c7a416227c23c3a3557c8b287239e1d9d9beb8ac97b4be1010ef17f797ef1e6fea1ab083400280e4cbb79786ab7bb6e369667bd0c767149a584e1174548f6de296a7a4903f5639f7fd697f955663239618bdc4fae22e31d8a1518291117c6116728b9cca1ee9683057ef01e494fde584e96539e4d5d7b263c85204a4856902ab43e4a09081a338545b60435c03a4c8952d057005c92d3f5b55267d26ee
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.815950 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.815950 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(32664b1f) ASYNC AWOKE. Re-checking buffer.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.815950 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Outbound connection to 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah. This peer is the DIALER - initiating identify protocol.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.815950 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(32664b1f) END (from buffer). Returning 2 bytes: 00a8. Buffer after: 168 bytes: f642ee27c008b24b8cc042c7a416227c23c3a3557c8b287239e1d9d9beb8ac97b4be1010ef17f797ef1e6fea1ab083400280e4cbb79786ab7bb6e369667bd0c767149a584e1174548f6de296a7a4903f5639f7fd697f955663239618bdc4fae22e31d8a1518291117c6116728b9cca1ee9683057ef01e494fde584e96539e4d5d7b263c85204a4856902ab43e4a09081a338545b60435c03a4c8952d057005c92d3f5b55267d26ee
2026-02-02T15:35:23.816976 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(8b0b22d5) START. Requested: 168. Buffer: 168 bytes.
2026-02-02T15:35:23.816976 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(8b0b22d5) END (from buffer). Returning 168 bytes: f642ee27c008b24b8cc042c7a416227c23c3a3557c8b287239e1d9d9beb8ac97b4be1010ef17f797ef1e6fea1ab083400280e4cbb79786ab7bb6e369667bd0c767149a584e1174548f6de296a7a4903f5639f7fd697f955663239618bdc4fae22e31d8a1518291117c6116728b9cca1ee9683057ef01e494fde584e96539e4d5d7b263c85204a4856902ab43e4a09081a338545b60435c03a4c8952d057005c92d3f5b55267d26ee. Buffer after: 0 bytes: 
2026-02-02T15:35:23.816976 [INFO] [NoiseProtocol] secureInbound: Read msg3: 168 bytes
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.820706 [FINE] [SwarmConn] SwarmConn.newStream (0): Entered to peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah. Context HashCode: 946411719
2026-02-02T15:35:23.820706 [FINE] [SwarmConn] SwarmConn.newStream (0): Connection is open.
2026-02-02T15:35:23.822212 [FINE] [SwarmConn] SwarmConn.newStream (0): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:35:23.823231 [FINE] [SwarmConn] SwarmConn.newStream (0): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:35:23.831739 [FINE] [YamuxStream] [1][Client] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.833738 [INFO] [NoiseProtocol] secureInbound: Handshake complete. Remote peer: 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:23.834738 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos, initialSendNonce=0, initialRecvNonce=0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.835738 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.835738 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1057631109
2026-02-02T15:35:23.836738 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1060023569
2026-02-02T15:35:23.836738 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:23.838737 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:23.839737 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.839737 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.840736 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [246, 86, 79, 234, 182, 115, 65, 161, 120, 86, 220, 213, 67, 111, 234, 254, 217, 86, 38, 54, 78, 4, 110, 90, 49, 22, 192, 117, 230, 220, 95, 247]
2026-02-02T15:35:23.840736 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [105, 157, 36, 165, 38, 0, 57, 38, 136, 226, 64, 234, 15, 196, 99, 77, 12, 54, 66, 167, 236, 175, 117, 8, 8, 119, 94, 20, 9, 239, 23, 88]
2026-02-02T15:35:23.841735 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.841735 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:23.842735 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:23.843735 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:23.845736 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:23.845736 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(0cb1ab3e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.845736 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(0cb1ab3e) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:23.846734 [FINEST] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Flushed 170 bytes successfully. Data preview (hex): 00a8f642ee27c008b24b8cc042c7a416227c23c3...
2026-02-02T15:35:23.846734 [INFO] [NoiseProtocol] secureOutbound: Handshake complete. Remote peer: 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:23.846734 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:35:23.846734 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1060023569
2026-02-02T15:35:23.847734 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1057631109
2026-02-02T15:35:23.862731 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [105, 157, 36, 165, 38, 0, 57, 38, 136, 226, 64, 234, 15, 196, 99, 77, 12, 54, 66, 167, 236, 175, 117, 8, 8, 119, 94, 20, 9, 239, 23, 88]
2026-02-02T15:35:23.863732 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [246, 86, 79, 234, 182, 115, 65, 161, 120, 86, 220, 213, 67, 111, 234, 254, 217, 86, 38, 54, 78, 4, 110, 90, 49, 22, 192, 117, 230, 220, 95, 247]
2026-02-02T15:35:23.873239 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:23.874239 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:35:23.875239 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:35:23.875239 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:35:23.875239 [FINER] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Writing 38 bytes: 002411fe1ffe37944fc99ecc55ed17186f3fce51c3405b0834b84e20a3f51398a51a931d7010
2026-02-02T15:35:23.876239 [FINEST] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Flushed 38 bytes successfully. Data preview (hex): 002411fe1ffe37944fc99ecc55ed17186f3fce51...
2026-02-02T15:35:23.876239 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:23.877239 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.877239 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.877239 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.877239 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:23.877239 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:23.877239 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:23.877239 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:23.878240 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(e0f5d613) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.878240 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(e0f5d613) ASYNC WAIT. Requested: 2. Buffer: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.835738 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:23.880920 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.882429 [FINEST] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 002411fe1ffe37944fc99ecc55ed17186f3fce51c3405b0834b84e20a3f51398a51a931d7010
2026-02-02T15:35:23.882429 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(0cb1ab3e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.883433 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(0cb1ab3e) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 11fe1ffe37944fc99ecc55ed17186f3fce51c3405b0834b84e20a3f51398a51a931d7010
2026-02-02T15:35:23.883433 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.886116 [FINE] [Swarm] Swarm.dialPeer: Connection established for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah. Conn ID: 0
2026-02-02T15:35:23.887636 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:23.887636 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:23.887636 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 30 bytes: 001c8639a53bb997359f6b6c4fff67d919e21bd576e8332736dc22d283fc
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.883433 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:23.888636 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:35:23.888636 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:35:23.888636 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:35:23.889635 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:35:23.889635 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:35:23.889635 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(c38fec82) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:35:23.889635 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(c38fec82) END (from buffer). Returning 36 bytes: 11fe1ffe37944fc99ecc55ed17186f3fce51c3405b0834b84e20a3f51398a51a931d7010. Buffer after: 0 bytes: 
2026-02-02T15:35:23.889635 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [17, 254, 31, 254]
2026-02-02T15:35:23.890637 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:35:23.890637 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 11fe1ffe37944fc99ecc55ed17186f3fce51c3405b0834b84e20a3f51398a51a931d7010
2026-02-02T15:35:23.890637 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:35:23.890637 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:35:23.891144 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 11fe1ffe37944fc99ecc55ed17186f3fce51c340
2026-02-02T15:35:23.891144 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 5b0834b84e20a3f51398a51a931d7010
2026-02-02T15:35:23.891144 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [17, 254, 31, 254]
2026-02-02T15:35:23.891144 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [91, 8, 52, 184]
2026-02-02T15:35:23.892149 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [91, 8, 52, 184, 78, 32, 163, 245, 19, 152, 165, 26, 147, 29, 112, 16]
2026-02-02T15:35:23.892149 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:23.892149 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1060023569): [105, 157, 36, 165, 38, 0, 57, 38, 136, 226, 64, 234, 15, 196, 99, 77, 12, 54, 66, 167, 236, 175, 117, 8, 8, 119, 94, 20, 9, 239, 23, 88]
2026-02-02T15:35:23.893149 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:35:23.893149 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:23.893149 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:23.893149 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:23.893149 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:23.894149 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:23.894149 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:23.894149 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:35:23.894149 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:35:23.894149 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:35:23.895147 [FINER] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Writing 38 bytes: 002467780fba69710730fc8cc9fa80ed7ef8ed3b3a600133becaf61e3a133489ed239a31bd2b
2026-02-02T15:35:23.896149 [FINEST] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Flushed 38 bytes successfully. Data preview (hex): 002467780fba69710730fc8cc9fa80ed7ef8ed3b...
2026-02-02T15:35:23.896149 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:23.896149 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:23.896149 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:23.896149 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.896149 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.897147 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.897147 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:23.897147 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:23.897147 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:23.897147 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:23.897147 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(b79831aa) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.897147 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(b79831aa) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:23.898147 [FINEST] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 002467780fba69710730fc8cc9fa80ed7ef8ed3b3a600133becaf61e3a133489ed239a31bd2b
2026-02-02T15:35:23.898147 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(e0f5d613) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.898147 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(e0f5d613) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 67780fba69710730fc8cc9fa80ed7ef8ed3b3a600133becaf61e3a133489ed239a31bd2b
2026-02-02T15:35:23.898147 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:35:23.898147 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.898147 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 30 bytes successfully. Data preview (hex): 001c8639a53bb997359f6b6c4fff67d919e21bd5...
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.898897 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:35:23.898897 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:35:23.898897 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:35:23.898897 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:35:23.898897 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:35:23.898897 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(3d9c694f) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:35:23.898897 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(3d9c694f) END (from buffer). Returning 36 bytes: 67780fba69710730fc8cc9fa80ed7ef8ed3b3a600133becaf61e3a133489ed239a31bd2b. Buffer after: 0 bytes: 
2026-02-02T15:35:23.898897 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [103, 120, 15, 186]
2026-02-02T15:35:23.899911 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:35:23.899911 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 67780fba69710730fc8cc9fa80ed7ef8ed3b3a600133becaf61e3a133489ed239a31bd2b
2026-02-02T15:35:23.899911 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:35:23.899911 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:35:23.899911 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 67780fba69710730fc8cc9fa80ed7ef8ed3b3a60
2026-02-02T15:35:23.899911 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 0133becaf61e3a133489ed239a31bd2b
2026-02-02T15:35:23.899911 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [103, 120, 15, 186]
2026-02-02T15:35:23.899911 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [1, 51, 190, 202]
2026-02-02T15:35:23.900911 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [1, 51, 190, 202, 246, 30, 58, 19, 52, 137, 237, 35, 154, 49, 189, 43]
2026-02-02T15:35:23.900911 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:23.901311 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057631109): [246, 86, 79, 234, 182, 115, 65, 161, 120, 86, 220, 213, 67, 111, 234, 254, 217, 86, 38, 54, 78, 4, 110, 90, 49, 22, 192, 117, 230, 220, 95, 247]
2026-02-02T15:35:23.901815 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:35:23.901815 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:23.901815 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:23.901815 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:23.901815 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:23.902832 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:35:23.902832 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:35:23.902832 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:35:23.902832 [FINER] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Writing 32 bytes: 001ed6b7b60b43f71efead515014795dee537ae07c287a6d96888da24de480f5
2026-02-02T15:35:23.903831 [FINEST] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Flushed 32 bytes successfully. Data preview (hex): 001ed6b7b60b43f71efead515014795dee537ae0...
2026-02-02T15:35:23.903831 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:23.904832 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.904832 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.904832 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.904832 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:23.904832 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:23.905830 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:23.905830 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:23.905830 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(ae424dff) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.905830 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(ae424dff) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:23.905830 [FINEST] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001ed6b7b60b43f71efead515014795dee537ae07c287a6d96888da24de480f5
2026-02-02T15:35:23.905830 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(b79831aa) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.905830 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(b79831aa) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: d6b7b60b43f71efead515014795dee537ae07c287a6d96888da24de480f5
2026-02-02T15:35:23.906831 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:35:23.906831 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:23.906831 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:35:23.906831 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:35:23.906831 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:35:23.906831 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:35:23.906831 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:35:23.907829 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(e4b76c76) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:35:23.907829 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(e4b76c76) END (from buffer). Returning 30 bytes: d6b7b60b43f71efead515014795dee537ae07c287a6d96888da24de480f5. Buffer after: 0 bytes: 
2026-02-02T15:35:23.907829 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [214, 183, 182, 11]
2026-02-02T15:35:23.907829 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:35:23.907829 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: d6b7b60b43f71efead515014795dee537ae07c287a6d96888da24de480f5
2026-02-02T15:35:23.907829 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:35:23.907829 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:35:23.907829 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: d6b7b60b43f71efead515014795d
2026-02-02T15:35:23.908830 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: ee537ae07c287a6d96888da24de480f5
2026-02-02T15:35:23.908830 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [214, 183, 182, 11]
2026-02-02T15:35:23.908830 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [238, 83, 122, 224]
2026-02-02T15:35:23.908830 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [238, 83, 122, 224, 124, 40, 122, 109, 150, 136, 141, 162, 77, 228, 128, 245]
2026-02-02T15:35:23.909335 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:23.909335 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1060023569): [105, 157, 36, 165, 38, 0, 57, 38, 136, 226, 64, 234, 15, 196, 99, 77, 12, 54, 66, 167, 236, 175, 117, 8, 8, 119, 94, 20, 9, 239, 23, 88]
2026-02-02T15:35:23.909335 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:35:23.909335 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:23.910339 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:23.910339 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:23.910339 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/yamux/1.0.0"
2026-02-02T15:35:23.910339 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/yamux/1.0.0"
2026-02-02T15:35:23.910339 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/yamux/1.0.0". Sending acknowledgment: "/yamux/1.0.0".
2026-02-02T15:35:23.910339 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.912338 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c8639a53bb997359f6b6c4fff67d919e21bd576e8332736dc22d283fc
2026-02-02T15:35:23.912338 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(0c7ebe85) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.913337 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(0c7ebe85) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 8639a53bb997359f6b6c4fff67d919e21bd576e8332736dc22d283fc
2026-02-02T15:35:23.913337 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:23.913337 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:23.913843 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:23.913843 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.913843 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.913843 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:23.913843 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:23.913843 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:23.914347 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(b775ffd3) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:23.914347 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(b775ffd3) END (from buffer). Returning 28 bytes: 8639a53bb997359f6b6c4fff67d919e21bd576e8332736dc22d283fc. Buffer after: 0 bytes: 
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.914347 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.914347 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [134, 57, 165, 59]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.914347 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.914347 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:23.914347 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 8639a53bb997359f6b6c4fff67d919e21bd576e8332736dc22d283fc
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.914347 [FINER] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Writing 32 bytes: 001e4635af01938214b46b658a2e489c46ea936ae61a9320f1b0bb06f7cc6b5b
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.914347 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:23.914347 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:23.914347 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 8639a53bb997359f6b6c4fff
2026-02-02T15:35:23.914347 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 67d919e21bd576e8332736dc22d283fc
2026-02-02T15:35:23.914347 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [134, 57, 165, 59]
2026-02-02T15:35:23.915361 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [103, 217, 25, 226]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.915361 [FINEST] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Flushed 32 bytes successfully. Data preview (hex): 001e4635af01938214b46b658a2e489c46ea936a...
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.915361 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [103, 217, 25, 226, 27, 213, 118, 232, 51, 39, 54, 220, 34, 210, 131, 252]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.915361 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/yamux/1.0.0".
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.915361 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.915361 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/yamux/1.0.0" and its handler.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.915361 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064635575): [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.915361 [FINE] [multistream] [multistreamMuxer - handle] Protocol /yamux/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:23.915361 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /yamux/1.0.0 on stream scope and stream. Proceeding to call handler.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.915361 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:35:23.916362 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:23.916362 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:23.916362 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:23.917361 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:23.921435 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:23.921435 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:35:23.922435 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:23.922435 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:23.922435 [FINER] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Writing 30 bytes: 001c9af440ee3f025836d96b202185af0ede30c258ac43d754c81f24f3df
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.922435 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.922435 [FINEST] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c9af440ee3f025836d96b202185af0ede30c258ac43d754c81f24f3df
2026-02-02T15:35:23.923435 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(65b631f3) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.923435 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(65b631f3) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 9af440ee3f025836d96b202185af0ede30c258ac43d754c81f24f3df
2026-02-02T15:35:23.923435 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:23.923435 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:23.923435 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:23.923435 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:23.923942 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:23.923942 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:23.923942 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:23.923942 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(410f721f) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:23.923942 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(410f721f) END (from buffer). Returning 28 bytes: 9af440ee3f025836d96b202185af0ede30c258ac43d754c81f24f3df. Buffer after: 0 bytes: 
2026-02-02T15:35:23.923942 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [154, 244, 64, 238]
2026-02-02T15:35:23.923942 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:23.923942 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 9af440ee3f025836d96b202185af0ede30c258ac43d754c81f24f3df
2026-02-02T15:35:23.923942 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:23.923942 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:23.923942 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 9af440ee3f025836d96b2021
2026-02-02T15:35:23.923942 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 85af0ede30c258ac43d754c81f24f3df
2026-02-02T15:35:23.923942 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [154, 244, 64, 238]
2026-02-02T15:35:23.923942 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [133, 175, 14, 222]
2026-02-02T15:35:23.923942 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [133, 175, 14, 222, 48, 194, 88, 172, 67, 215, 84, 200, 31, 36, 243, 223]
2026-02-02T15:35:23.923942 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:23.925447 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059730016): [10, 32, 200, 192, 148, 10, 84, 24, 166, 217, 78, 62, 33, 82, 238, 247, 120, 174, 240, 98, 43, 63, 125, 98, 100, 221, 181, 185, 93, 226, 221, 227]
2026-02-02T15:35:23.925447 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:35:23.925447 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:23.925447 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:23.925447 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.926315 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068123926-6517
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.926315 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.929151 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.930164 [FINER] [YamuxStream] [1][Client] StreamID=1 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.930164 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:35:23.931698 [FINE] [SwarmConn] SwarmConn (0): Context set: f26eac92-d5d2-4c57-b824-795b7543b38c
2026-02-02T15:35:23.931698 [FINE] [Swarm] Storing inbound connection for peer=12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos, conn_id=0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.933586 [FINER] [YamuxStream] [1][Client] StreamID=1 open() called. Current state: YamuxStreamState.init
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.934090 [FINE] [Swarm] Connection stored. Total connections for "12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos": 1
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.934090 [FINE] [YamuxStream] [1][Client] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:23.935120 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:35:23.935120 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:35:23.935120 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:23.935120 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:23.935120 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 30 bytes: 001cb04f37aac2c87a0921bee1b58557ce0ee61b06b190f300391ee70d30
2026-02-02T15:35:23.936133 [FINEST] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Flushed 30 bytes successfully. Data preview (hex): 001c9af440ee3f025836d96b202185af0ede30c2...
2026-02-02T15:35:23.936133 [FINE] [YamuxStream] [0][Server] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:23.937640 [FINER] [YamuxStream] [0][Server] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:35:23.937640 [FINE] [YamuxStream] [0][Server] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:23.938161 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:35:23.938161 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:35:23.938161 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:23.938161 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:23.938161 [FINER] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Writing 30 bytes: 001cfb6e39b347f05816f854402ae32feef2841982ee7360b532ff51f17a
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.938161 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos. Conn ID: 0, Direction: Direction.inbound
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.939175 [FINEST] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Flushed 30 bytes successfully. Data preview (hex): 001cfb6e39b347f05816f854402ae32feef28419...
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.939175 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.939175 [FINER] [YamuxStream] [0][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.940175 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos. Conn ID: 0
2026-02-02T15:35:23.940175 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.940681 [FINE] [Swarm] Accepted inbound stream 1 from 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc on conn 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.940681 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos.
2026-02-02T15:35:23.942132 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:23.943132 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Inbound connection from 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos. This peer is the LISTENER - waiting for remote to initiate identify protocol.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.943132 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068123941-6523 for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:23.944131 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:23.946131 [FINEST] [YamuxStream] [0][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.946131 [FINEST] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e4635af01938214b46b658a2e489c46ea936ae61a9320f1b0bb06f7cc6b5b
2026-02-02T15:35:23.947132 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(ae424dff) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.947132 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(ae424dff) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 4635af01938214b46b658a2e489c46ea936ae61a9320f1b0bb06f7cc6b5b
2026-02-02T15:35:23.947132 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:35:23.947132 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:23.948131 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:35:23.948131 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:35:23.948131 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:35:23.948131 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:35:23.948131 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:35:23.948131 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(997d06a1) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:35:23.948131 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(997d06a1) END (from buffer). Returning 30 bytes: 4635af01938214b46b658a2e489c46ea936ae61a9320f1b0bb06f7cc6b5b. Buffer after: 0 bytes: 
2026-02-02T15:35:23.949130 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [70, 53, 175, 1]
2026-02-02T15:35:23.949130 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:35:23.949130 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 4635af01938214b46b658a2e489c46ea936ae61a9320f1b0bb06f7cc6b5b
2026-02-02T15:35:23.949130 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:35:23.949130 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:35:23.949130 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 4635af01938214b46b658a2e489c
2026-02-02T15:35:23.949130 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 46ea936ae61a9320f1b0bb06f7cc6b5b
2026-02-02T15:35:23.949130 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [70, 53, 175, 1]
2026-02-02T15:35:23.950129 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [70, 234, 147, 106]
2026-02-02T15:35:23.950129 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [70, 234, 147, 106, 230, 26, 147, 32, 241, 176, 187, 6, 247, 204, 107, 91]
2026-02-02T15:35:23.950129 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.950129 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.950129 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057631109): [246, 86, 79, 234, 182, 115, 65, 161, 120, 86, 220, 213, 67, 111, 234, 254, 217, 86, 38, 54, 78, 4, 110, 90, 49, 22, 192, 117, 230, 220, 95, 247]
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.950129 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.950129 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.950129 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.951128 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.951128 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.951128 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:23.951128 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.951128 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.951128 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.951128 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.951128 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.951128 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.951634 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(73e98d77) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.951634 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(73e98d77) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:23.951634 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cb04f37aac2c87a0921bee1b58557ce0ee61b06b190f300391ee70d30
2026-02-02T15:35:23.951634 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 30 bytes successfully. Data preview (hex): 001cb04f37aac2c87a0921bee1b58557ce0ee61b...
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.951634 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.951634 [FINE] [SwarmConn] SwarmConn.newStream (0): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 1
2026-02-02T15:35:23.951634 [FINE] [SwarmConn] SwarmConn.newStream (0): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 1.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.952638 [FINE] [Swarm] Swarm._dialSingleAddr: Successfully dialed and upgraded connection to 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw at /ip4/127.0.0.1/tcp/4102
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.952638 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068123951-5985 for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.952638 [FINE] [HappyEyeballsDialer] Connected via /ip4/127.0.0.1/tcp/4102
2026-02-02T15:35:23.952638 [FINE] [Swarm] Swarm.dialPeer: Successfully connected to 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:23.952638 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068123952-539
2026-02-02T15:35:23.953638 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:23.953638 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:35:23.953638 [FINE] [SwarmConn] SwarmConn (0): Context set: da9d7641-f073-41e7-b039-8736fa93b23d
2026-02-02T15:35:23.954638 [INFO] [Swarm] Swarm.dialPeer: Dial latency for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: 560ms
2026-02-02T15:35:23.955638 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:23.955638 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.955638 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.955638 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.955638 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:23.955638 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:23.956638 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:23.956638 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:23.956638 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:23.956638 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(ea01e20a) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.956638 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(ea01e20a) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:23.956638 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:23.956638 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.956638 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.957644 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.957644 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.957644 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:23.957644 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:23.957644 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:23.957644 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:23.957644 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.957644 [INFO] [ConnectionHealthMetrics] Connection health state changed: ConnectionHealthState.unknown -> ConnectionHealthState.healthy
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.957644 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(da6f728f) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.957644 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(da6f728f) ASYNC WAIT. Requested: 2. Buffer: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.958643 [FINE] [identify]  [IDENTIFY-STREAM-CREATE] peer=12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah, stream_id=1, protocol=/ipfs/id/1.0.0, duration=137ms
2026-02-02T15:35:23.958643 [FINE] [YamuxStream] [1][Client] StreamID=1 setDeadline() set to 2026-02-02T15:35:53.958643
2026-02-02T15:35:23.960641 [FINE] [YamuxStream] [1][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:35:23.962641 [INFO] [SwarmConn] SwarmConn (0): Health state changed to ConnectionHealthState.healthy for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:23.963911 [INFO] [Swarm] Swarm: Connection health changed for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah (0): ConnectionHealthState.healthy -> ConnectionHealthState.healthy
2026-02-02T15:35:23.963911 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:23.963911 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:35:23.964926 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:23.964926 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:23.964926 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 50 bytes: 00309f245cb298bf345f79ef2689b0dd80612f81dc8fbeb62e5caf663dfa689dad573f6837d4f57713e7e69ebeeb9479bcc2
2026-02-02T15:35:23.965924 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 50 bytes successfully. Data preview (hex): 00309f245cb298bf345f79ef2689b0dd80612f81...
2026-02-02T15:35:23.965924 [FINE] [YamuxStream] [1][Client] StreamID=1 Direct write: Successfully wrote all 20 bytes in 4ms
2026-02-02T15:35:23.965924 [FINEST] [YamuxStream] [1][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:23.966923 [FINEST] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cfb6e39b347f05816f854402ae32feef2841982ee7360b532ff51f17a
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.966923 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. Conn ID: 0, Direction: Direction.outbound
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.966923 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(73e98d77) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.966923 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(73e98d77) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: fb6e39b347f05816f854402ae32feef2841982ee7360b532ff51f17a
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.966923 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.966923 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:23.966923 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.966923 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. Conn ID: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.966923 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:23.967924 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.967924 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.967924 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:23.967924 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:23.967924 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:23.967924 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(37bb7857) START. Requested: 28. Buffer: 28 bytes.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.967924 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.967924 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(37bb7857) END (from buffer). Returning 28 bytes: fb6e39b347f05816f854402ae32feef2841982ee7360b532ff51f17a. Buffer after: 0 bytes: 
2026-02-02T15:35:23.967924 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [251, 110, 57, 179]
2026-02-02T15:35:23.967924 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:23.967924 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: fb6e39b347f05816f854402ae32feef2841982ee7360b532ff51f17a
2026-02-02T15:35:23.967924 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:23.968923 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.967924 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Outbound connection to 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. This peer is the DIALER - initiating identify protocol.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.968923 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: fb6e39b347f05816f854402a
2026-02-02T15:35:23.968923 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: e32feef2841982ee7360b532ff51f17a
2026-02-02T15:35:23.968923 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [251, 110, 57, 179]
2026-02-02T15:35:23.968923 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [227, 47, 238, 242]
2026-02-02T15:35:23.968923 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [227, 47, 238, 242, 132, 25, 130, 238, 115, 96, 181, 50, 255, 81, 241, 122]
2026-02-02T15:35:23.968923 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:23.968923 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059730016): [10, 32, 200, 192, 148, 10, 84, 24, 166, 217, 78, 62, 33, 82, 238, 247, 120, 174, 240, 98, 43, 63, 125, 98, 100, 221, 181, 185, 93, 226, 221, 227]
2026-02-02T15:35:23.972427 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:35:23.972427 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:23.972427 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:35:23.972427 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:23.972427 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:23.973444 [FINER] [YamuxStream] [1][Client] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262124, New: 524268
2026-02-02T15:35:23.973444 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:23.973444 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.973444 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.973444 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.973444 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:23.974442 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:23.974442 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:23.974442 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:23.974442 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:23.974442 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(4b97a7ae) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:23.974442 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(4b97a7ae) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: b04f37aac2c87a0921bee1b58557ce0ee61b06b190f300391ee70d30
2026-02-02T15:35:23.974442 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:23.974442 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:23.974442 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:23.974442 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:23.974442 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:23.974442 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:23.974442 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:23.975946 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(e75894c1) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:23.975946 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(e75894c1) END (from buffer). Returning 28 bytes: b04f37aac2c87a0921bee1b58557ce0ee61b06b190f300391ee70d30. Buffer after: 0 bytes: 
2026-02-02T15:35:23.975946 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [176, 79, 55, 170]
2026-02-02T15:35:23.975946 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:23.975946 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: b04f37aac2c87a0921bee1b58557ce0ee61b06b190f300391ee70d30
2026-02-02T15:35:23.975946 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:23.975946 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:23.975946 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: b04f37aac2c87a0921bee1b5
2026-02-02T15:35:23.975946 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 8557ce0ee61b06b190f300391ee70d30
2026-02-02T15:35:23.976968 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [176, 79, 55, 170]
2026-02-02T15:35:23.976968 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [133, 87, 206, 14]
2026-02-02T15:35:23.976968 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [133, 87, 206, 14, 230, 27, 6, 177, 144, 243, 0, 57, 30, 231, 13, 48]
2026-02-02T15:35:23.976968 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:23.976968 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064635575): [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
2026-02-02T15:35:23.976968 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:35:23.976968 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:23.977966 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:35:23.977966 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:23.977966 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:23.977966 [FINER] [YamuxStream] [0][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:35:23.977966 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 00309f245cb298bf345f79ef2689b0dd80612f81dc8fbeb62e5caf663dfa689dad573f6837d4f57713e7e69ebeeb9479bcc2
2026-02-02T15:35:23.977966 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:23.977966 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.978966 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.978966 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.978966 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:23.978966 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:23.978966 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:23.978966 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:23.979471 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:23.979471 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(e3b08322) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.979471 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(e3b08322) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:23.979471 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:23.979471 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.979471 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.979471 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.979471 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:23.979471 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:23.980475 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:23.980475 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:23.980475 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:23.980475 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(0e08d96a) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:35:23.980475 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(0e08d96a) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 9f245cb298bf345f79ef2689b0dd80612f81dc8fbeb62e5caf663dfa689dad573f6837d4f57713e7e69ebeeb9479bcc2
2026-02-02T15:35:23.980475 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:23.980475 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:23.980475 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:23.980475 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:23.980475 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:23.980475 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:23.981475 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:23.981475 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(7bb2b32c) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:23.981475 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(7bb2b32c) END (from buffer). Returning 48 bytes: 9f245cb298bf345f79ef2689b0dd80612f81dc8fbeb62e5caf663dfa689dad573f6837d4f57713e7e69ebeeb9479bcc2. Buffer after: 0 bytes: 
2026-02-02T15:35:23.981475 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [159, 36, 92, 178]
2026-02-02T15:35:23.981475 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:23.981475 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 9f245cb298bf345f79ef2689b0dd80612f81dc8fbeb62e5caf663dfa689dad573f6837d4f57713e7e69ebeeb9479bcc2
2026-02-02T15:35:23.981475 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:23.981475 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:23.981475 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 9f245cb298bf345f79ef2689b0dd80612f81dc8fbeb62e5caf663dfa689dad57
2026-02-02T15:35:23.981475 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 3f6837d4f57713e7e69ebeeb9479bcc2
2026-02-02T15:35:23.981475 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [159, 36, 92, 178]
2026-02-02T15:35:23.982475 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [63, 104, 55, 212]
2026-02-02T15:35:23.982475 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [63, 104, 55, 212, 245, 119, 19, 231, 230, 158, 190, 235, 148, 121, 188, 194]
2026-02-02T15:35:23.982475 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:23.982475 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064635575): [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
2026-02-02T15:35:23.982475 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:35:23.982475 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:23.983475 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:35:23.983475 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:23.983475 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:23.983475 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:23.983475 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.983475 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.983475 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.983475 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:23.983475 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:23.984474 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:23.984474 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:23.984474 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:23.985475 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.985475 [FINE] [SwarmConn] SwarmConn.newStream (0): Entered to peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. Context HashCode: 751590308
2026-02-02T15:35:23.986989 [FINE] [SwarmConn] SwarmConn.newStream (0): Connection is open.
2026-02-02T15:35:23.987993 [FINE] [SwarmConn] SwarmConn.newStream (0): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:35:23.987993 [FINE] [SwarmConn] SwarmConn.newStream (0): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.989993 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:23.989993 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:23.990993 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:23.990993 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:23.990993 [FINE] [YamuxStream] [0][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:35:23.991992 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:23.991992 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:35:23.991992 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:23.991992 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:23.992993 [FINER] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Writing 50 bytes: 00307e8c6dd7245dc867022a3c8d5b8ae26b4a65e3ce3d49b1cb72a514f298036d651b0b6296e7a55eb5288abe846e320f70
2026-02-02T15:35:23.992993 [FINEST] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Flushed 50 bytes successfully. Data preview (hex): 00307e8c6dd7245dc867022a3c8d5b8ae26b4a65...
2026-02-02T15:35:23.992993 [FINE] [YamuxStream] [0][Server] StreamID=1 Direct write: Successfully wrote all 20 bytes in 2ms
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.992993 [FINE] [YamuxStream] [1][Client] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.992993 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:23.992993 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:23.992993 [FINEST] [YamuxStream] [0][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:23.993991 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:23.993991 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.993991 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.993991 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.993991 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:23.993991 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:23.994990 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:23.994990 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:23.994990 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:23.994990 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(0e00dfc4) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:23.994990 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(0e00dfc4) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:23.994990 [FINEST] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 00307e8c6dd7245dc867022a3c8d5b8ae26b4a65e3ce3d49b1cb72a514f298036d651b0b6296e7a55eb5288abe846e320f70
2026-02-02T15:35:23.994990 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(e3b08322) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:23.994990 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(e3b08322) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 7e8c6dd7245dc867022a3c8d5b8ae26b4a65e3ce3d49b1cb72a514f298036d651b0b6296e7a55eb5288abe846e320f70
2026-02-02T15:35:23.994990 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:23.995992 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:23.995992 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:23.995992 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:23.995992 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:23.995992 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:23.995992 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:23.995992 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(88a6f542) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:23.995992 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(88a6f542) END (from buffer). Returning 48 bytes: 7e8c6dd7245dc867022a3c8d5b8ae26b4a65e3ce3d49b1cb72a514f298036d651b0b6296e7a55eb5288abe846e320f70. Buffer after: 0 bytes: 
2026-02-02T15:35:23.995992 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [126, 140, 109, 215]
2026-02-02T15:35:23.995992 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:23.996990 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 7e8c6dd7245dc867022a3c8d5b8ae26b4a65e3ce3d49b1cb72a514f298036d651b0b6296e7a55eb5288abe846e320f70
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.995992 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.996990 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:23.996990 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:23.996990 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 7e8c6dd7245dc867022a3c8d5b8ae26b4a65e3ce3d49b1cb72a514f298036d65
2026-02-02T15:35:23.996990 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 1b0b6296e7a55eb5288abe846e320f70
2026-02-02T15:35:23.996990 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [126, 140, 109, 215]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.996990 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0])
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.996990 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [27, 11, 98, 150]
2026-02-02T15:35:23.996990 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [27, 11, 98, 150, 231, 165, 94, 181, 40, 138, 190, 132, 110, 50, 15, 112]
2026-02-02T15:35:23.996990 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:23.996990 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059730016): [10, 32, 200, 192, 148, 10, 84, 24, 166, 217, 78, 62, 33, 82, 238, 247, 120, 174, 240, 98, 43, 63, 125, 98, 100, 221, 181, 185, 93, 226, 221, 227]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.997990 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.997990 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:35:23.997990 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.997990 [FINE] [Swarm] Swarm.dialPeer: Connection established for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. Conn ID: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.997990 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:35:23.997990 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:23.998819 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:23.998819 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:23.998819 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:23.998819 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:23.998819 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:23.998819 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:23.999415 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.999415 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.999415 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.999415 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.999415 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.999415 [FINER] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Writing 30 bytes: 001c001fcd783042e4619ef70fb0bb1846c32828e8e4e19bf0403e1ba375
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.999415 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:23.999415 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:23.999415 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:23.999415 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.999415 [FINEST] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c001fcd783042e4619ef70fb0bb1846c32828e8e4e19bf0403e1ba375
2026-02-02T15:35:23.999415 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(ea01e20a) ASYNC AWOKE. Re-checking buffer.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:23.999415 [FINE] [YamuxStream] [1][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:23.999415 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(ea01e20a) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 001fcd783042e4619ef70fb0bb1846c32828e8e4e19bf0403e1ba375
2026-02-02T15:35:24.000428 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:24.000428 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:24.000428 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:24.000428 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:24.000428 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.000428 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.000428 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:24.000428 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.000428 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.001427 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(dc393fea) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:24.001427 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(dc393fea) END (from buffer). Returning 28 bytes: 001fcd783042e4619ef70fb0bb1846c32828e8e4e19bf0403e1ba375. Buffer after: 0 bytes: 
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.001427 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:35:24.001427 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.001427 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [0, 31, 205, 120]
2026-02-02T15:35:24.001932 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.001932 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 46 bytes: 002c104d287ae572740e6d59de66dda900c3ad2cce3059ae034484b65429727a90736363a5304bab488d5c41f1c2
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.001932 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 001fcd783042e4619ef70fb0bb1846c32828e8e4e19bf0403e1ba375
2026-02-02T15:35:24.001932 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:24.001932 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.001932 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 46 bytes successfully. Data preview (hex): 002c104d287ae572740e6d59de66dda900c3ad2c...
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.001932 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 001fcd783042e4619ef70fb0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.001932 [FINE] [YamuxStream] [1][Client] StreamID=1 Direct write: Successfully wrote all 16 bytes in 1ms
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.001932 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: bb1846c32828e8e4e19bf0403e1ba375
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.001932 [FINEST] [YamuxStream] [1][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.001932 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [0, 31, 205, 120]
2026-02-02T15:35:24.001932 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [187, 24, 70, 195]
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.001932 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:24.002949 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.001932 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [187, 24, 70, 195, 40, 40, 232, 228, 225, 155, 240, 64, 62, 27, 163, 117]
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.002949 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.002949 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.002949 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.002949 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:24.002949 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.002949 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1060023569): [105, 157, 36, 165, 38, 0, 57, 38, 136, 226, 64, 234, 15, 196, 99, 77, 12, 54, 66, 167, 236, 175, 117, 8, 8, 119, 94, 20, 9, 239, 23, 88]
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.002949 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:24.003948 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:24.003948 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:24.003948 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(7b0e3e9f) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:24.003948 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(7b0e3e9f) ASYNC WAIT. Requested: 2. Buffer: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.003948 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.003948 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002c104d287ae572740e6d59de66dda900c3ad2cce3059ae034484b65429727a90736363a5304bab488d5c41f1c2
2026-02-02T15:35:24.004949 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(0e00dfc4) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:24.004949 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(0e00dfc4) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: 104d287ae572740e6d59de66dda900c3ad2cce3059ae034484b65429727a90736363a5304bab488d5c41f1c2
2026-02-02T15:35:24.004949 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:35:24.004949 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.004949 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.004949 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:35:24.004949 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:35:24.004949 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:35:24.004949 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:35:24.004949 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:35:24.004949 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(85b518db) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:35:24.005948 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(85b518db) END (from buffer). Returning 44 bytes: 104d287ae572740e6d59de66dda900c3ad2cce3059ae034484b65429727a90736363a5304bab488d5c41f1c2. Buffer after: 0 bytes: 
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.005948 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0]
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.005948 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [16, 77, 40, 122]
2026-02-02T15:35:24.005948 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.005948 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.005948 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: 104d287ae572740e6d59de66dda900c3ad2cce3059ae034484b65429727a90736363a5304bab488d5c41f1c2
2026-02-02T15:35:24.005948 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.005948 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.005948 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:35:24.005948 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 104d287ae572740e6d59de66dda900c3ad2cce3059ae034484b65429
2026-02-02T15:35:24.005948 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 727a90736363a5304bab488d5c41f1c2
2026-02-02T15:35:24.005948 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [16, 77, 40, 122]
2026-02-02T15:35:24.005948 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [114, 122, 144, 115]
2026-02-02T15:35:24.006948 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [114, 122, 144, 115, 99, 99, 165, 48, 75, 171, 72, 141, 92, 65, 241, 194]
2026-02-02T15:35:24.006948 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:24.006948 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064635575): [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
2026-02-02T15:35:24.006948 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:35:24.006948 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:35:24.007948 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:35:24.007948 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:24.007948 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:24.007948 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:35:24.007948 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.007948 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.007948 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.007948 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:35:24.007948 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:35:24.007948 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:24.007948 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:35:24.007948 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:24.008947 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:35:24.009451 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:35:24.009451 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:35:24.009451 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/ipfs/id/1.0.0"
2026-02-02T15:35:24.009451 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/ipfs/id/1.0.0"
2026-02-02T15:35:24.009451 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/ipfs/id/1.0.0". Sending acknowledgment: "/ipfs/id/1.0.0".
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.009451 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0])
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.009451 [FINE] [YamuxStream] [0][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.009451 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.009451 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:35:24.009451 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.010466 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:24.010466 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.010466 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:35:24.010466 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.010466 [FINER] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Writing 30 bytes: 001ca705349b8acdf1211c105a0ad876a4250e88df98ddef3a178964029b
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.010466 [FINER] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Writing 46 bytes: 002ccc8005a21fe57248b560124b9d4a0415d35af377d83b3f2e140aea63a40283746cf45190c22eaad5061fe341
2026-02-02T15:35:24.010466 [FINEST] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Flushed 46 bytes successfully. Data preview (hex): 002ccc8005a21fe57248b560124b9d4a0415d35a...
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.010466 [FINEST] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Flushed 30 bytes successfully. Data preview (hex): 001c001fcd783042e4619ef70fb0bb1846c32828...
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.010466 [FINE] [YamuxStream] [0][Server] StreamID=1 Direct write: Successfully wrote all 16 bytes in 1ms
2026-02-02T15:35:24.010466 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/ipfs/id/1.0.0".
2026-02-02T15:35:24.011466 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/ipfs/id/1.0.0" and its handler.
2026-02-02T15:35:24.011466 [FINE] [multistream] [multistreamMuxer - handle] Protocol /ipfs/id/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.011466 [FINEST] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001ca705349b8acdf1211c105a0ad876a4250e88df98ddef3a178964029b
2026-02-02T15:35:24.011466 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(da6f728f) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:24.011466 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(da6f728f) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: a705349b8acdf1211c105a0ad876a4250e88df98ddef3a178964029b
2026-02-02T15:35:24.011466 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:24.011466 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:24.012466 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:24.012466 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:24.012466 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:24.012466 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:24.012466 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:24.012466 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(15f11469) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:24.012466 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(15f11469) END (from buffer). Returning 28 bytes: a705349b8acdf1211c105a0ad876a4250e88df98ddef3a178964029b. Buffer after: 0 bytes: 
2026-02-02T15:35:24.012466 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [167, 5, 52, 155]
2026-02-02T15:35:24.012466 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.012466 [FINE] [StreamScopeImpl] stream-1770068123941-6523: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.012466 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: a705349b8acdf1211c105a0ad876a4250e88df98ddef3a178964029b
2026-02-02T15:35:24.013466 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:24.013466 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:24.013466 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: a705349b8acdf1211c105a0a
2026-02-02T15:35:24.013466 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: d876a4250e88df98ddef3a178964029b
2026-02-02T15:35:24.013466 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [167, 5, 52, 155]
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.013466 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.013466 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [216, 118, 164, 37]
2026-02-02T15:35:24.013466 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [216, 118, 164, 37, 14, 136, 223, 152, 221, 239, 58, 23, 137, 100, 2, 155]
2026-02-02T15:35:24.013466 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:24.014466 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057631109): [246, 86, 79, 234, 182, 115, 65, 161, 120, 86, 220, 213, 67, 111, 234, 254, 217, 86, 38, 54, 78, 4, 110, 90, 49, 22, 192, 117, 230, 220, 95, 247]
2026-02-02T15:35:24.014466 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:35:24.014466 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:24.015467 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:24.015467 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:24.015467 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.017465 [FINE] [StreamScopeImpl] stream-1770068123941-6523: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:24.018022 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /ipfs/id/1.0.0 on stream scope and stream. Proceeding to call handler.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.018022 [FINER] [YamuxStream] [1][Client] StreamID=1 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:35:24.018529 [FINER] [YamuxStream] [1][Client] StreamID=1 open() called. Current state: YamuxStreamState.init
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.018529 [FINE] [identify] IdentifyService.handleIdentifyRequest: SERVER received identify request from 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc (reported as 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc) on stream 1
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.018529 [FINE] [YamuxStream] [1][Client] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:24.018529 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:35:24.019533 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:35:24.019533 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:24.020038 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:24.020038 [FINER] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Writing 30 bytes: 001c2b35baf83998de0d8f190153a5808c5f15495de5cf286a9ae024bbb0
2026-02-02T15:35:24.020038 [FINEST] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Flushed 30 bytes successfully. Data preview (hex): 001c2b35baf83998de0d8f190153a5808c5f1549...
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.021043 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER ENTRY POINT for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. IsPush: false. Stream ID: 1
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.021043 [FINE] [SwarmConn] SwarmConn.newStream (0): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 1
2026-02-02T15:35:24.021043 [FINE] [SwarmConn] SwarmConn.newStream (0): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 1.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.021043 [FINE] [identify] IdentifyService.sendIdentifyResp: Preparing to send identify response to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. IsPush: false. Stream ID: 1
2026-02-02T15:35:24.021043 [FINER] [identify] IdentifyService.sendIdentifyResp: Setting service scope for stream to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
2026-02-02T15:35:24.022548 [FINE] [StreamScopeImpl] stream-1770068123941-6523: Setting service to libp2p.identify for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc, protocol /ipfs/id/1.0.0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.023608 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068124021-6369 for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.023608 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.024608 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.024608 [FINE] [StreamScopeImpl] stream-1770068123941-6523: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:35:24.024608 [FINER] [identify] IdentifyService.sendIdentifyResp: Acquiring current snapshot for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.024608 [INFO] [ConnectionHealthMetrics] Connection health state changed: ConnectionHealthState.unknown -> ConnectionHealthState.healthy
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.025607 [FINE] [identify] IdentifyService.sendIdentifyResp: Sending snapshot to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc: seq=4, protocols=7, addrs=2
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.025607 [FINE] [identify]  [IDENTIFY-STREAM-CREATE] peer=12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, stream_id=1, protocol=/ipfs/id/1.0.0, duration=49ms
2026-02-02T15:35:24.026112 [FINE] [YamuxStream] [1][Client] StreamID=1 setDeadline() set to 2026-02-02T15:35:54.025607
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.026112 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Creating base response for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. Snapshot seq: 4
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.027116 [FINE] [YamuxStream] [1][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:35:24.029115 [INFO] [SwarmConn] SwarmConn (0): Health state changed to ConnectionHealthState.healthy for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:24.030115 [INFO] [Swarm] Swarm: Connection health changed for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw (0): ConnectionHealthState.healthy -> ConnectionHealthState.healthy
2026-02-02T15:35:24.031115 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:24.031115 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.031115 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ObservedAddr set to /ip4/127.0.0.1/tcp/58645 for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.032115 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:24.032115 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.032115 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: LocalAddr: /ip4/0.0.0.0/tcp/4502, RemoteAddr: /ip4/127.0.0.1/tcp/58645, ViaLoopback: true for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.032115 [FINER] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Writing 50 bytes: 0030bcbbec40469ca8d774396972265b9719dc73fd2a22d560fe36beeda12ab3227a58e12af00398a0efb45c65cf2ab79d37
2026-02-02T15:35:24.033114 [FINEST] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Flushed 50 bytes successfully. Data preview (hex): 0030bcbbec40469ca8d774396972265b9719dc73...
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.033114 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added 2 listen addresses for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.033448 [FINE] [YamuxStream] [1][Client] StreamID=1 Direct write: Successfully wrote all 20 bytes in 4ms
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.033952 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added public key (36 bytes) for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:24.034283 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ProtocolVersion: ipfs/0.1.0, AgentVersion: dart-libp2p/0.1.0 for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:24.035304 [FINER] [identify] IdentifyService._getSignedRecord: Attempting to get signed record. DisableSignedPeerRecord: false, Snapshot record type: Future<Envelope?>
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.035304 [FINEST] [YamuxStream] [1][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.035304 [FINER] [identify] IdentifyService._getSignedRecord: Marshalled signed record successfully (181 bytes).
2026-02-02T15:35:24.036043 [FINER] [identify] IdentifyService.sendIdentifyResp: Added signed peer record (181 bytes) to response for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
2026-02-02T15:35:24.036043 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER About to write identify message to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc on stream 1 (remote addr: /ip4/127.0.0.1/tcp/58645)
2026-02-02T15:35:24.038062 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Writing to stream 1 for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. Total message size: 437 bytes. SignedPeerRecord present: true
2026-02-02T15:35:24.038567 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Sending as single delimited message (size 437).
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.038567 [FINEST] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Flushed 30 bytes successfully. Data preview (hex): 001ca705349b8acdf1211c105a0ad876a4250e88...
2026-02-02T15:35:24.038567 [FINE] [YamuxStream] [0][Server] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:24.038567 [FINER] [YamuxStream] [0][Server] StreamID=1 open() called. Current state: YamuxStreamState.init
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.038567 [FINE] [YamuxStream] [0][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 439 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524252
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.038567 [FINE] [YamuxStream] [0][Server] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:24.038567 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:35:24.038567 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.038567 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 451, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 183, 181, 3, 10, 36, 8, 1, 18, 32])
2026-02-02T15:35:24.038567 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.040071 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:24.040071 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:24.040071 [FINER] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Writing 30 bytes: 001c26a603997912d1676522761f8d81ed0553c5cff2976d88a0b8e3d776
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.040071 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 467 bytes (plaintext was 451)
2026-02-02T15:35:24.040071 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 469
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.040071 [FINEST] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Flushed 30 bytes successfully. Data preview (hex): 001c26a603997912d1676522761f8d81ed0553c5...
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.040071 [FINER] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Writing 469 bytes: 01d39d0b2db54d15d0da82f599086c61691ba7fca80a9d68040f82a4eb7e6d8bf2e6dcdc4e0cff8bb6f9edddf2c4e01ec66e0891d576ab959c48959302942ba4e185e4c24637566770df89f3e56f35b44dc4cb4a720e14f64c1bf36f35903ed722e438359ee9f407042240649a54ff3b1e6c0614e3a4b205cb10cd006c303e0c01676ccd671aa5333939a2b03168c5507aeb310b3f11b2e5b2c6b1f8dacfafc5060834e067879f64f09ac74bd4ecd6b7142e3e3ad07c6dd461dacf2da624d8a4615479da6f671e5bcb8de361f0cca4791c425d2acfdecf50c256fb010d921999ec91a28ebe6b060e90ce452ee6fa81225d161d89b09c33a0476d7da60bb617276ef25cd3ceed61cb6fbf8bb8d1cd4eb91e0f203e67fce358db0434d4e780e88cc309bca502361fdf5023b26aca5aac64c5bde7802354c5ed55e392014944c6f8a2ebfd113e828205777c565c74325bbf0a6b3194410cff89e0b86b5c3d339fd5aedd54aa245162901f4aa71b2586b4c7df5021d16b1e2c9d79a5122dd0ab9dbe4e49b09de6ab59fa91df3cf1b6d6b6dbdb9f11ab46dcbabbb4ffc9ef46966d6bc1c1a5e98fa15140f0574f0a6c6102861b7f96bea502534c33b6e486ac3a9bdd0923184fc7001753b3f534b8a58a1dd37cfb3e39f7
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.041077 [FINER] [YamuxStream] [0][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:35:24.041077 [FINE] [Swarm] Accepted inbound stream 1 from 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos on conn 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.041878 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:24.041878 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.041878 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.041878 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068124041-7806 for peer 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.041878 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.041878 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:24.041878 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:24.041878 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:24.041878 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:24.042896 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:24.042896 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(2426293e) START. Requested: 2. Buffer: 0 bytes.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.042896 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.042896 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(2426293e) ASYNC WAIT. Requested: 2. Buffer: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.042896 [FINEST] [YamuxStream] [0][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.042896 [FINEST] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002ccc8005a21fe57248b560124b9d4a0415d35af377d83b3f2e140aea63a40283746cf45190c22eaad5061fe341
2026-02-02T15:35:24.042896 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(7b0e3e9f) ASYNC AWOKE. Re-checking buffer.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.042896 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.042896 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(7b0e3e9f) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: cc8005a21fe57248b560124b9d4a0415d35af377d83b3f2e140aea63a40283746cf45190c22eaad5061fe341
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.042896 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.042896 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.043894 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.043894 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:24.043894 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.043894 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.043894 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.043894 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.043894 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:35:24.043894 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.043894 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.043894 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.043894 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.043894 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(825eb064) START. Requested: 44. Buffer: 44 bytes.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.043894 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.043894 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(825eb064) END (from buffer). Returning 44 bytes: cc8005a21fe57248b560124b9d4a0415d35af377d83b3f2e140aea63a40283746cf45190c22eaad5061fe341. Buffer after: 0 bytes: 
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.043894 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.043894 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [204, 128, 5, 162]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.043894 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(bf812651) START. Requested: 2. Buffer: 0 bytes.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.043894 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.043894 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(bf812651) ASYNC WAIT. Requested: 2. Buffer: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.044895 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: cc8005a21fe57248b560124b9d4a0415d35af377d83b3f2e140aea63a40283746cf45190c22eaad5061fe341
2026-02-02T15:35:24.044895 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:35:24.044895 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.044895 [FINEST] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c2b35baf83998de0d8f190153a5808c5f15495de5cf286a9ae024bbb0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.044895 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: cc8005a21fe57248b560124b9d4a0415d35af377d83b3f2e140aea63
2026-02-02T15:35:24.044895 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: a40283746cf45190c22eaad5061fe341
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.044895 [FINEST] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c26a603997912d1676522761f8d81ed0553c5cff2976d88a0b8e3d776
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.044895 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [204, 128, 5, 162]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.044895 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(bf812651) ASYNC AWOKE. Re-checking buffer.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.044895 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [164, 2, 131, 116]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.044895 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(bf812651) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 26a603997912d1676522761f8d81ed0553c5cff2976d88a0b8e3d776
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.044895 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [164, 2, 131, 116, 108, 244, 81, 144, 194, 46, 170, 213, 6, 31, 227, 65]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.044895 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.044895 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.044895 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.045894 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059730016): [10, 32, 200, 192, 148, 10, 84, 24, 166, 217, 78, 62, 33, 82, 238, 247, 120, 174, 240, 98, 43, 63, 125, 98, 100, 221, 181, 185, 93, 226, 221, 227]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.045894 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:24.045894 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:24.045894 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.045894 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.045894 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.045894 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.045894 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.046895 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.046895 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(371a26f5) START. Requested: 28. Buffer: 28 bytes.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.046895 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.046895 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(371a26f5) END (from buffer). Returning 28 bytes: 26a603997912d1676522761f8d81ed0553c5cff2976d88a0b8e3d776. Buffer after: 0 bytes: 
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.046895 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:24.046895 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.046895 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [38, 166, 3, 153]
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.046895 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.046895 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.046895 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.046895 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 26a603997912d1676522761f8d81ed0553c5cff2976d88a0b8e3d776
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.046895 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.046895 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.046895 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:35:24.046895 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.046895 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.046895 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.046895 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 26a603997912d1676522761f
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.046895 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.046895 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 8d81ed0553c5cff2976d88a0b8e3d776
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.046895 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.047893 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [38, 166, 3, 153]
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.047893 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.047893 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [141, 129, 237, 5]
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.047893 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:35:24.047893 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.047893 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [141, 129, 237, 5, 83, 197, 207, 242, 151, 109, 136, 160, 184, 227, 215, 118]
2026-02-02T15:35:24.047893 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:24.047893 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057631109): [246, 86, 79, 234, 182, 115, 65, 161, 120, 86, 220, 213, 67, 111, 234, 254, 217, 86, 38, 54, 78, 4, 110, 90, 49, 22, 192, 117, 230, 220, 95, 247]
2026-02-02T15:35:24.048713 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:35:24.048713 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:24.049219 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:35:24.049219 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:24.049219 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.049219 [FINE] [YamuxStream] [1][Client] StreamID=1 setDeadline() set to 2026-02-02T15:35:54.047893
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.049219 [FINER] [YamuxStream] [1][Client] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262124, New: 524268
2026-02-02T15:35:24.049219 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:24.049219 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.049219 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.049219 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.050236 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:24.050236 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:24.050236 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:24.050236 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:24.050236 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:24.050236 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(10eeac5b) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:24.050236 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(10eeac5b) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 2b35baf83998de0d8f190153a5808c5f15495de5cf286a9ae024bbb0
2026-02-02T15:35:24.050236 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:24.050236 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:24.050236 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:24.050236 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:24.050236 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:24.050236 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.051741 [FINE] [StreamScopeImpl] stream-1770068123951-5985: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.050236 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.051741 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.051741 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(20ca5068) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:24.051741 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(20ca5068) END (from buffer). Returning 28 bytes: 2b35baf83998de0d8f190153a5808c5f15495de5cf286a9ae024bbb0. Buffer after: 0 bytes: 
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.051741 [FINE] [StreamScopeImpl] stream-1770068123951-5985: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.051741 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [43, 53, 186, 248]
2026-02-02T15:35:24.052333 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:24.052333 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 2b35baf83998de0d8f190153a5808c5f15495de5cf286a9ae024bbb0
2026-02-02T15:35:24.052333 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:24.052333 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:24.052333 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 2b35baf83998de0d8f190153
2026-02-02T15:35:24.052333 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: a5808c5f15495de5cf286a9ae024bbb0
2026-02-02T15:35:24.052333 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [43, 53, 186, 248]
2026-02-02T15:35:24.052333 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [165, 128, 140, 95]
2026-02-02T15:35:24.054346 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [165, 128, 140, 95, 21, 73, 93, 229, 207, 40, 106, 154, 224, 36, 187, 176]
2026-02-02T15:35:24.055346 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:24.055346 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1060023569): [105, 157, 36, 165, 38, 0, 57, 38, 136, 226, 64, 234, 15, 196, 99, 77, 12, 54, 66, 167, 236, 175, 117, 8, 8, 119, 94, 20, 9, 239, 23, 88]
2026-02-02T15:35:24.055346 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:35:24.055346 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.052333 [FINE] [identify]  [IDENTIFY-STREAM-READY] peer=12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah, stream_id=1, protocol=/ipfs/id/1.0.0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.056346 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:35:24.056346 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:24.056346 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:24.056346 [FINER] [YamuxStream] [0][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:35:24.057345 [FINEST] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030bcbbec40469ca8d774396972265b9719dc73fd2a22d560fe36beeda12ab3227a58e12af00398a0efb45c65cf2ab79d37
2026-02-02T15:35:24.057345 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:24.057345 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.057345 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.057345 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.057345 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.057345 [FINE] [StreamScopeImpl] stream-1770068123951-5985: Setting service to libp2p.identify for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah, protocol /ipfs/id/1.0.0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.058344 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:24.058344 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.058344 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.058344 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.058344 [FINE] [StreamScopeImpl] stream-1770068123951-5985: Successfully set service to libp2p.identify. Edges updated.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.058344 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:24.058344 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(3572f16f) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:24.058344 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(3572f16f) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:24.058344 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:24.059345 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.059345 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.059345 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.059345 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:24.059345 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:24.059345 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:24.059345 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:24.060343 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:24.060343 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(7beac465) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:35:24.060343 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(7beac465) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: bcbbec40469ca8d774396972265b9719dc73fd2a22d560fe36beeda12ab3227a58e12af00398a0efb45c65cf2ab79d37
2026-02-02T15:35:24.060343 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:24.060343 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:24.060343 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:24.060343 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.060343 [FINEST] [YamuxStream] [1][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.060343 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:24.060343 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:24.061343 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:24.061343 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(33a7bee7) START. Requested: 48. Buffer: 48 bytes.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.061343 [FINEST] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Flushed 469 bytes successfully. Data preview (hex): 01d39d0b2db54d15d0da82f599086c61691ba7fc...
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.061343 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(33a7bee7) END (from buffer). Returning 48 bytes: bcbbec40469ca8d774396972265b9719dc73fd2a22d560fe36beeda12ab3227a58e12af00398a0efb45c65cf2ab79d37. Buffer after: 0 bytes: 
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.061343 [FINE] [YamuxStream] [0][Server] StreamID=1 Direct write: Successfully wrote all 439 bytes in 22ms
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.061343 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [188, 187, 236, 64]
2026-02-02T15:35:24.061343 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:24.061343 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: bcbbec40469ca8d774396972265b9719dc73fd2a22d560fe36beeda12ab3227a58e12af00398a0efb45c65cf2ab79d37
2026-02-02T15:35:24.061343 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:24.061343 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:24.062343 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: bcbbec40469ca8d774396972265b9719dc73fd2a22d560fe36beeda12ab3227a
2026-02-02T15:35:24.062343 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 58e12af00398a0efb45c65cf2ab79d37
2026-02-02T15:35:24.062848 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [188, 187, 236, 64]
2026-02-02T15:35:24.062848 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [88, 225, 42, 240]
2026-02-02T15:35:24.062848 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [88, 225, 42, 240, 3, 152, 160, 239, 180, 92, 101, 207, 42, 183, 157, 55]
2026-02-02T15:35:24.062848 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:24.062848 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1060023569): [105, 157, 36, 165, 38, 0, 57, 38, 136, 226, 64, 234, 15, 196, 99, 77, 12, 54, 66, 167, 236, 175, 117, 8, 8, 119, 94, 20, 9, 239, 23, 88]
2026-02-02T15:35:24.063852 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:35:24.063852 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.061343 [FINE] [identify] IdentifyService._writeChunkedIdentifyMsg: Single message sent to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.064851 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:35:24.064851 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.064851 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Identify message written to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.064851 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.064851 [FINER] [identify] IdentifyService.sendIdentifyResp: Updating sequence number for connection to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.064851 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:24.064851 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.064851 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.064851 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.064851 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.064851 [FINER] [identify] IdentifyService.sendIdentifyResp: Updated sequence for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc to 4.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.065851 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.065851 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Signalling end of writes (calling stream.closeWrite()) on stream to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.065851 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:24.065851 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:24.065851 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.065851 [FINER] [YamuxStream] [0][Server] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:35:24.066851 [FINER] [YamuxStream] [0][Server] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:35:24.066851 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:24.066851 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.066851 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.066851 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:24.067851 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:24.067851 [FINER] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Writing 30 bytes: 001c0104361e25b924737ebbac212a200646fc0006647c918d11332486b4
2026-02-02T15:35:24.068456 [FINEST] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Flushed 30 bytes successfully. Data preview (hex): 001c0104361e25b924737ebbac212a200646fc00...
2026-02-02T15:35:24.068456 [FINE] [YamuxStream] [0][Server] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.068456 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:24.068962 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.068962 [FINE] [YamuxStream] [0][Server] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:35:24.068962 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER stream.closeWrite() completed for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. Stream will NOT be fully closed by sendIdentifyResp anymore.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.068962 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:24.070002 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:24.070002 [FINE] [YamuxStream] [0][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:35:24.072002 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:24.072002 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:35:24.072508 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:24.072508 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:24.072508 [FINER] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Writing 50 bytes: 003016b5aa0a520c293e76f3b7923fe4942bfba4fed8e7178129cbaea7eb301788888956a8647cf4e3144307c7c904df3d7a
2026-02-02T15:35:24.072508 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:24.073513 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.073513 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.073513 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.073513 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:24.073513 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:24.074511 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:24.074511 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:24.074511 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:24.074511 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(f651e074) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:24.074511 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(f651e074) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:24.074511 [FINEST] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 003016b5aa0a520c293e76f3b7923fe4942bfba4fed8e7178129cbaea7eb301788888956a8647cf4e3144307c7c904df3d7a
2026-02-02T15:35:24.075510 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(3572f16f) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:24.075510 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(3572f16f) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 16b5aa0a520c293e76f3b7923fe4942bfba4fed8e7178129cbaea7eb301788888956a8647cf4e3144307c7c904df3d7a
2026-02-02T15:35:24.075510 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:24.075510 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:24.075510 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:24.076510 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:24.076510 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:24.076510 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:24.076510 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:24.076510 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(bdaa25f7) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:24.076510 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(bdaa25f7) END (from buffer). Returning 48 bytes: 16b5aa0a520c293e76f3b7923fe4942bfba4fed8e7178129cbaea7eb301788888956a8647cf4e3144307c7c904df3d7a. Buffer after: 0 bytes: 
2026-02-02T15:35:24.076510 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [22, 181, 170, 10]
2026-02-02T15:35:24.076510 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:24.077510 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 16b5aa0a520c293e76f3b7923fe4942bfba4fed8e7178129cbaea7eb301788888956a8647cf4e3144307c7c904df3d7a
2026-02-02T15:35:24.077510 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:24.077510 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:24.077510 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 16b5aa0a520c293e76f3b7923fe4942bfba4fed8e7178129cbaea7eb30178888
2026-02-02T15:35:24.077510 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 8956a8647cf4e3144307c7c904df3d7a
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.068962 [FINE] [identify] IdentifyService.sendIdentifyResp: Successfully sent identify response and signalled closeWrite to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. IsPush: false.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.077510 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [22, 181, 170, 10]
2026-02-02T15:35:24.077510 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [137, 86, 168, 100]
2026-02-02T15:35:24.077510 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [137, 86, 168, 100, 124, 244, 227, 20, 67, 7, 199, 201, 4, 223, 61, 122]
2026-02-02T15:35:24.078510 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:24.078510 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057631109): [246, 86, 79, 234, 182, 115, 65, 161, 120, 86, 220, 213, 67, 111, 234, 254, 217, 86, 38, 54, 78, 4, 110, 90, 49, 22, 192, 117, 230, 220, 95, 247]
2026-02-02T15:35:24.079510 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:35:24.079510 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:24.079510 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:35:24.079510 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:24.079510 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:24.079510 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:24.079510 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.080509 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.080509 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.080509 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:24.080509 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:24.080509 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:24.080509 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:24.080509 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:24.080509 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:24.080509 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:24.080509 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:24.080509 [FINE] [YamuxStream] [1][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:35:24.083018 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:35:24.083018 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:35:24.083596 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:35:24.083596 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:35:24.083596 [FINER] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Writing 46 bytes: 002ca69d122493375d4a8a3afaff4c376029fd8beba0974a88ce7e38344b5b1b775e0095a930fc5831ecb1a95965
2026-02-02T15:35:24.083596 [FINEST] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Flushed 46 bytes successfully. Data preview (hex): 002ca69d122493375d4a8a3afaff4c376029fd8b...
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.083596 [FINEST] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - RAW_SOCKET_DATA_CHUNK_RECV (499 bytes): 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
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.083596 [FINE] [YamuxStream] [1][Client] StreamID=1 Direct write: Successfully wrote all 16 bytes in 1ms
2026-02-02T15:35:24.084600 [FINEST] [YamuxStream] [1][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:24.085106 [FINEST] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Flushed 50 bytes successfully. Data preview (hex): 003016b5aa0a520c293e76f3b7923fe4942bfba4...
2026-02-02T15:35:24.085106 [FINE] [YamuxStream] [0][Server] StreamID=1 Direct write: Successfully wrote all 20 bytes in 15ms
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.085106 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.085106 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:24.085106 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.085106 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.085106 [FINEST] [YamuxStream] [0][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.085106 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.085106 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.085106 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:24.085106 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.085106 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.085106 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.086119 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.086119 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.086119 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:24.086119 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:24.086119 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:24.086623 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:24.086623 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:24.086623 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(9823ca3b) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:24.086623 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(9823ca3b) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:24.086623 [FINEST] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002ca69d122493375d4a8a3afaff4c376029fd8beba0974a88ce7e38344b5b1b775e0095a930fc5831ecb1a95965
2026-02-02T15:35:24.086623 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(f651e074) ASYNC AWOKE. Re-checking buffer.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.086119 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.087628 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(f651e074) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: a69d122493375d4a8a3afaff4c376029fd8beba0974a88ce7e38344b5b1b775e0095a930fc5831ecb1a95965
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.087628 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.087628 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.087628 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.087628 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.087628 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(c2c1edd1) START. Requested: 2. Buffer: 499 bytes.
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.087628 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:35:24.088627 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.088627 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(c2c1edd1) END (from buffer). Returning 2 bytes: 01d3. Buffer after: 497 bytes: 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
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.088627 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.088627 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [1, 211]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.088627 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.088627 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.088627 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.089132 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [1, 211]
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.089132 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(45ead018) START. Requested: 44. Buffer: 44 bytes.
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.089132 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 01d3
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.089132 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(45ead018) END (from buffer). Returning 44 bytes: a69d122493375d4a8a3afaff4c376029fd8beba0974a88ce7e38344b5b1b775e0095a930fc5831ecb1a95965. Buffer after: 0 bytes: 
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.089132 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 467
2026-02-02T15:35:24.089132 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 467
2026-02-02T15:35:24.089132 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 467 more bytes (have 0/467)
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.089132 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [166, 157, 18, 36]
00:54 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.089132 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(de5acfb2) START. Requested: 467. Buffer: 497 bytes.
2026-02-02T15:35:24.089132 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(de5acfb2) END (from buffer). Returning 467 bytes: 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. Buffer after: 30 bytes: 001c0104361e25b924737ebbac212a200646fc0006647c918d11332486b4
2026-02-02T15:35:24.089132 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 467 bytes. First 4 bytes: [157, 11, 45, 181]
2026-02-02T15:35:24.089132 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 467, Got: 467
2026-02-02T15:35:24.089132 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 467, Bytes: 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
2026-02-02T15:35:24.089132 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 467
2026-02-02T15:35:24.089132 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(451) and MAC(16)
2026-02-02T15:35:24.090637 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 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
2026-02-02T15:35:24.090637 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 001753b3f534b8a58a1dd37cfb3e39f7
2026-02-02T15:35:24.090637 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [157, 11, 45, 181]
2026-02-02T15:35:24.090637 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [0, 23, 83, 179]
2026-02-02T15:35:24.090637 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [0, 23, 83, 179, 245, 52, 184, 165, 138, 29, 211, 124, 251, 62, 57, 247]
2026-02-02T15:35:24.090637 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
00:54 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.091655 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:35:24.091655 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: a69d122493375d4a8a3afaff4c376029fd8beba0974a88ce7e38344b5b1b775e0095a930fc5831ecb1a95965
2026-02-02T15:35:24.092655 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:35:24.092655 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:35:24.092655 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: a69d122493375d4a8a3afaff4c376029fd8beba0974a88ce7e38344b
2026-02-02T15:35:24.092655 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 5b1b775e0095a930fc5831ecb1a95965
2026-02-02T15:35:24.092655 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [166, 157, 18, 36]
2026-02-02T15:35:24.092655 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [91, 27, 119, 94]
2026-02-02T15:35:24.093655 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [91, 27, 119, 94, 0, 149, 169, 48, 252, 88, 49, 236, 177, 169, 89, 101]
2026-02-02T15:35:24.093655 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:24.094160 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1060023569): [105, 157, 36, 165, 38, 0, 57, 38, 136, 226, 64, 234, 15, 196, 99, 77, 12, 54, 66, 167, 236, 175, 117, 8, 8, 119, 94, 20, 9, 239, 23, 88]
2026-02-02T15:35:24.094160 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:35:24.094160 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:35:24.094160 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:35:24.094160 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:24.094160 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:24.096164 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:35:24.096164 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.097163 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.097163 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.097163 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059730016): [10, 32, 200, 192, 148, 10, 84, 24, 166, 217, 78, 62, 33, 82, 238, 247, 120, 174, 240, 98, 43, 63, 125, 98, 100, 221, 181, 185, 93, 226, 221, 227]
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.097163 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:35:24.097163 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:35:24.097163 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:24.097163 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:35:24.098163 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.098163 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 451 bytes
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.098163 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.098163 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 451 bytes to _decryptedBuffer. New _decryptedBuffer.length: 451
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.098163 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.098163 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 439. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 183]
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.098163 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.098163 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:24.098163 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.098163 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/ipfs/id/1.0.0"
2026-02-02T15:35:24.098163 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/ipfs/id/1.0.0"
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.098163 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=439
2026-02-02T15:35:24.099163 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.099163 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/ipfs/id/1.0.0". Sending acknowledgment: "/ipfs/id/1.0.0".
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.099163 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.099163 [FINE] [YamuxStream] [0][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.099163 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.099163 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=439
2026-02-02T15:35:24.099163 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 439, _decryptedBuffer.length: 439
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.099163 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.099163 [FINER] [SecuredConnection] SecuredConnection.read (length=439): Returning 439 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [181, 3, 10, 36, 8, 1, 18, 32, 6, 10, 242, 219, 240, 62, 75, 253, 216, 216, 28, 109]
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.099163 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.099163 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=439
2026-02-02T15:35:24.099163 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.100163 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.100163 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 439, flags: 0
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.100163 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.100163 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 439 bytes directly to waiting reader
2026-02-02T15:35:24.100163 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 475
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.100163 [FINER] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Writing 46 bytes: 002ca3d44d3cd14b13c9f43184729b65c8c915defed36aac480ce9c3d88b4900d004b6ecd9103471a5487fe62152
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.100163 [FINE] [identify]  [READ-ALL-ID-MESSAGES] Parsed identify from peer=12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah, 437 bytes, duration=39ms
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.100909 [FINEST] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Flushed 46 bytes successfully. Data preview (hex): 002ca3d44d3cd14b13c9f43184729b65c8c915de...
2026-02-02T15:35:24.100909 [FINE] [YamuxStream] [0][Server] StreamID=1 Direct write: Successfully wrote all 16 bytes in 1ms
2026-02-02T15:35:24.100909 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/ipfs/id/1.0.0".
2026-02-02T15:35:24.100909 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/ipfs/id/1.0.0" and its handler.
2026-02-02T15:35:24.100909 [FINE] [multistream] [multistreamMuxer - handle] Protocol /ipfs/id/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:24.103659 [FINE] [StreamScopeImpl] stream-1770068124041-7806: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:24.104672 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.104672 [FINE] [identify] IdentifyService._consumeMessage: Consuming identify message from 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah. IsPush: false.
2026-02-02T15:35:24.106177 [FINER] [identify] IdentifyService._consumeMessage: Current known protocols for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah: 0
2026-02-02T15:35:24.106177 [FINER] [identify] IdentifyService._consumeMessage: Received protocols from 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah: 7
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.107198 [FINE] [StreamScopeImpl] stream-1770068124041-7806: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.107198 [FINER] [identify] IdentifyService._diff: Calculating protocol diff. Before: 0, After: 7
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.107198 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /ipfs/id/1.0.0 on stream scope and stream. Proceeding to call handler.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.107198 [FINER] [identify] IdentifyService._diff: Added: 7, Removed: 0
2026-02-02T15:35:24.107198 [FINE] [identify] IdentifyService._consumeMessage: For peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah - Added protocols: 7, Removed protocols: 0
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.108197 [FINE] [identify] IdentifyService.handleIdentifyRequest: SERVER received identify request from 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos (reported as 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos) on stream 1
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.108197 [FINE] [identify] IdentifyService._consumeMessage: Parsed observed address for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah: /ip4/127.0.0.1/tcp/58645
2026-02-02T15:35:24.109197 [FINE] [identify] IdentifyService._consumeMessage: Recording observed address /ip4/127.0.0.1/tcp/58645 for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah via conn 0.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.109197 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER ENTRY POINT for peer 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos. IsPush: false. Stream ID: 1
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.110196 [FINER] [identify] IdentifyService._consumeMessage: Processing 2 listen addresses from 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.110196 [FINE] [identify] IdentifyService.sendIdentifyResp: Preparing to send identify response to 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos. IsPush: false. Stream ID: 1
2026-02-02T15:35:24.110196 [FINER] [identify] IdentifyService.sendIdentifyResp: Setting service scope for stream to 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.110196 [FINE] [identify] IdentifyService._consumeMessage: Parsed 2 listen addresses for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
2026-02-02T15:35:24.110196 [FINER] [identify] IdentifyService._consumeMessage: Attempting to parse signed peer record for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah (181 bytes).
2026-02-02T15:35:24.111196 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Checking for signed peer record.
2026-02-02T15:35:24.111196 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Attempting to consume envelope from 181 bytes.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.111702 [FINE] [StreamScopeImpl] stream-1770068124041-7806: Setting service to libp2p.identify for peer 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos, protocol /ipfs/id/1.0.0
2026-02-02T15:35:24.111702 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
2026-02-02T15:35:24.113706 [FINE] [StreamScopeImpl] stream-1770068124041-7806: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:35:24.113706 [FINER] [identify] IdentifyService.sendIdentifyResp: Acquiring current snapshot for 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos.
2026-02-02T15:35:24.113706 [FINE] [identify] IdentifyService.sendIdentifyResp: Sending snapshot to 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos: seq=3, protocols=6, addrs=2
2026-02-02T15:35:24.115833 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Creating base response for peer 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos. Snapshot seq: 3
2026-02-02T15:35:24.118338 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ObservedAddr set to /ip4/127.0.0.1/tcp/58646 for 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:24.118338 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: LocalAddr: /ip4/0.0.0.0/tcp/4102, RemoteAddr: /ip4/127.0.0.1/tcp/58646, ViaLoopback: true for 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:24.118338 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added 2 listen addresses for 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:24.120342 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added public key (36 bytes) for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:24.120342 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ProtocolVersion: ipfs/0.1.0, AgentVersion: dart-libp2p/0.1.0 for 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos
2026-02-02T15:35:24.121343 [FINER] [identify] IdentifyService._getSignedRecord: Attempting to get signed record. DisableSignedPeerRecord: false, Snapshot record type: Future<Envelope?>
2026-02-02T15:35:24.122341 [FINER] [identify] IdentifyService._getSignedRecord: Marshalled signed record successfully (181 bytes).
2026-02-02T15:35:24.122341 [FINER] [identify] IdentifyService.sendIdentifyResp: Added signed peer record (181 bytes) to response for 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos.
2026-02-02T15:35:24.123342 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER About to write identify message to 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos on stream 1 (remote addr: /ip4/127.0.0.1/tcp/58646)
2026-02-02T15:35:24.124340 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Writing to stream 1 for peer 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos. Total message size: 414 bytes. SignedPeerRecord present: true
2026-02-02T15:35:24.125342 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Sending as single delimited message (size 414).
2026-02-02T15:35:24.125849 [FINE] [YamuxStream] [0][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 416 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524252
2026-02-02T15:35:24.125849 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 428, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 160, 158, 3, 10, 36, 8, 1, 18, 32])
2026-02-02T15:35:24.129644 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:35:24.130643 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 444 bytes (plaintext was 428)
2026-02-02T15:35:24.130643 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 446
2026-02-02T15:35:24.130643 [FINER] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Writing 446 bytes: 01bc3d9b1bde1fa84a46836e7616560bc62c2e24c3a4d0f91dfe519ab1aa21fcc70cb47680cc4281e68f4b798ab77f3f3f904c167818a381a1aecc0465bed385840ffb1d62fb65bbc95fd24e8f89f26b9c5d8ac11adb37a740d80da957c5d7b259c6164baa26767bdcc35b07073f7451c2d43d1ac6f2ecdcedb1724dd9a37082dcffec1e89e4f43ed72fb458bbadd2713a57c63ac113823696167b0bfb3a50cb1dd9f0920a54bab2cbd824d233f44baa7142f5ca60256cecc83c5556a759533f83093df401336bcbf7f895fed45630fca698ff0e44d2e77642321e4f7794c533fced6d574e6ce83c2bda8e476558ee5276902e4e490cbcc04d38b5101f4067aba202fe50883575e50fadf68ebe6e741b64dd578095a21be7b31560970254af3f322c086030bc7f7fa7a1699daceb672a6a6b2896733f6fd821bf44bb8d06d1d48348acebf933ebf5ef64d4533cb189abf2d39470c421c3741eaa0d4a7df011a6355340a4ddb1f661f80a313cb991b9ec78cc6ebe77379ace9427c6c980fa6b9ec24fc64db429de155fea0cd9af04aac11561b8f7b2bc1163a987fd71b836bd4aa7e69552e3d3dd1acb10f91b54b8ca6fd7ace43b5395d6215b6c153004c4
2026-02-02T15:35:24.130643 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:24.130643 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.130643 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.130643 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.132148 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:24.132148 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:24.132148 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:24.132148 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:24.132148 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:24.132148 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(064fb537) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:24.132148 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(064fb537) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:24.132148 [FINEST] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - RAW_SOCKET_DATA_CHUNK_RECV (492 bytes): 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
2026-02-02T15:35:24.133176 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(9823ca3b) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:24.133176 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(9823ca3b) END (from buffer). Returning 2 bytes: 002c. Buffer after: 490 bytes: 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
2026-02-02T15:35:24.133176 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:35:24.133176 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:24.133176 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:35:24.133176 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:35:24.133176 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:35:24.133176 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:35:24.133176 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:35:24.133176 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(21a873a3) START. Requested: 44. Buffer: 490 bytes.
2026-02-02T15:35:24.133176 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(21a873a3) END (from buffer). Returning 44 bytes: a3d44d3cd14b13c9f43184729b65c8c915defed36aac480ce9c3d88b4900d004b6ecd9103471a5487fe62152. Buffer after: 446 bytes: 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
2026-02-02T15:35:24.134175 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [163, 212, 77, 60]
2026-02-02T15:35:24.134175 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:35:24.134175 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: a3d44d3cd14b13c9f43184729b65c8c915defed36aac480ce9c3d88b4900d004b6ecd9103471a5487fe62152
2026-02-02T15:35:24.134175 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:35:24.134175 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:35:24.134175 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: a3d44d3cd14b13c9f43184729b65c8c915defed36aac480ce9c3d88b
2026-02-02T15:35:24.134175 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 4900d004b6ecd9103471a5487fe62152
2026-02-02T15:35:24.134175 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [163, 212, 77, 60]
2026-02-02T15:35:24.134175 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [73, 0, 208, 4]
2026-02-02T15:35:24.134175 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [73, 0, 208, 4, 182, 236, 217, 16, 52, 113, 165, 72, 127, 230, 33, 82]
2026-02-02T15:35:24.135175 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:24.135175 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057631109): [246, 86, 79, 234, 182, 115, 65, 161, 120, 86, 220, 213, 67, 111, 234, 254, 217, 86, 38, 54, 78, 4, 110, 90, 49, 22, 192, 117, 230, 220, 95, 247]
2026-02-02T15:35:24.135175 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:35:24.135175 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:35:24.135175 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:35:24.136174 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:24.136174 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:24.136174 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:35:24.136174 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.136174 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.136174 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.136174 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:35:24.136174 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:35:24.137175 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:24.137175 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:35:24.137175 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:24.138174 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:35:24.138174 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:35:24.138174 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:35:24.138174 [FINE] [YamuxStream] [1][Client] StreamID=1 setDeadline() set to 2026-02-02T15:35:54.138174
2026-02-02T15:35:24.138174 [FINE] [StreamScopeImpl] stream-1770068124021-6369: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:24.139174 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
2026-02-02T15:35:24.139174 [FINE] [StreamScopeImpl] stream-1770068124021-6369: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:24.139679 [FINE] [identify]  [IDENTIFY-STREAM-READY] peer=12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, stream_id=1, protocol=/ipfs/id/1.0.0
2026-02-02T15:35:24.140683 [FINE] [StreamScopeImpl] stream-1770068124021-6369: Setting service to libp2p.identify for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, protocol /ipfs/id/1.0.0
2026-02-02T15:35:24.140683 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.141684 [FINE] [identify] IdentifyService.signedPeerRecordFromMessage: Successfully consumed envelope.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.141684 [FINE] [StreamScopeImpl] stream-1770068124021-6369: Successfully set service to libp2p.identify. Edges updated.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.141684 [FINE] [identify] IdentifyService._consumeMessage: Parsed signed peer record for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah: true
2026-02-02T15:35:24.141684 [FINER] [identify] IdentifyService._consumeMessage: Connectedness for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah: Connectedness.connected. Default TTL: 4:00:00.000000
2026-02-02T15:35:24.142683 [FINER] [identify] IdentifyService._consumeMessage: Peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah is connected/limited, using TTL: 875976:00:00.000000
2026-02-02T15:35:24.142683 [FINER] [identify] IdentifyService._consumeMessage: Updating address book for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah. Current TTLs: RecentlyConnectedAddrTTL=4:00:00.000000, ConnectedAddrTTL=875976:00:00.000000, TempAddrTTL=0:02:00.000000.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.143683 [FINEST] [YamuxStream] [1][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:24.143683 [FINEST] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Flushed 446 bytes successfully. Data preview (hex): 01bc3d9b1bde1fa84a46836e7616560bc62c2e24...
2026-02-02T15:35:24.143683 [FINE] [YamuxStream] [0][Server] StreamID=1 Direct write: Successfully wrote all 416 bytes in 17ms
2026-02-02T15:35:24.144682 [FINE] [identify] IdentifyService._writeChunkedIdentifyMsg: Single message sent to 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos.
2026-02-02T15:35:24.144682 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Identify message written to 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos.
2026-02-02T15:35:24.144682 [FINER] [identify] IdentifyService.sendIdentifyResp: Updating sequence number for connection to 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.144682 [FINER] [identify] IdentifyService._consumeMessage: Consuming signed peer record for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.145682 [FINER] [identify] IdentifyService.sendIdentifyResp: Updated sequence for 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos to 3.
2026-02-02T15:35:24.145682 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Signalling end of writes (calling stream.closeWrite()) on stream to 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.145682 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Consuming signed record for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
2026-02-02T15:35:24.146682 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Derived PeerId 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah from record public key for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.146682 [FINER] [YamuxStream] [0][Server] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:35:24.146682 [FINER] [YamuxStream] [0][Server] StreamID=1 Sending FIN frame for closeWrite().
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.146682 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Obtained record from envelope for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
2026-02-02T15:35:24.146682 [FINE] [identify] IdentifyService._consumeSignedPeerRecord: Successfully consumed signed peer record for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah. Found 2 addresses.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.146682 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:24.146682 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.147682 [FINE] [identify] IdentifyService._consumeMessage: Addresses from signed peer record for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah: 2
2026-02-02T15:35:24.148681 [FINER] [identify] IdentifyService._consumeMessage: Filtering addresses for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah based on remote connection address /ip4/127.0.0.1/tcp/4502. Before filter: 2
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.147682 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:24.148681 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:24.148681 [FINER] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Writing 30 bytes: 001c4fe9f2191bb33f53f712506a71b29e773c3082981bf1b874254d7a40
2026-02-02T15:35:24.149681 [FINEST] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Flushed 30 bytes successfully. Data preview (hex): 001c4fe9f2191bb33f53f712506a71b29e773c30...
2026-02-02T15:35:24.150680 [FINE] [YamuxStream] [0][Server] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:35:24.150680 [FINE] [YamuxStream] [0][Server] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:35:24.150680 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER stream.closeWrite() completed for 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos. Stream will NOT be fully closed by sendIdentifyResp anymore.
2026-02-02T15:35:24.150680 [FINE] [identify] IdentifyService.sendIdentifyResp: Successfully sent identify response and signalled closeWrite to 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos. IsPush: false.
2026-02-02T15:35:24.150680 [FINEST] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c4fe9f2191bb33f53f712506a71b29e773c3082981bf1b874254d7a40
2026-02-02T15:35:24.150680 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:24.150680 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.151680 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.151680 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.151680 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:24.151680 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:24.151680 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:24.151680 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:24.151680 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:24.151680 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(76b6c32d) START. Requested: 2. Buffer: 476 bytes.
2026-02-02T15:35:24.151680 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(76b6c32d) END (from buffer). Returning 2 bytes: 01bc. Buffer after: 474 bytes: 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
2026-02-02T15:35:24.152680 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [1, 188]
2026-02-02T15:35:24.152680 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:24.152680 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [1, 188]
2026-02-02T15:35:24.152680 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 01bc
2026-02-02T15:35:24.152680 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 444
2026-02-02T15:35:24.152680 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 444
2026-02-02T15:35:24.152680 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 444 more bytes (have 0/444)
2026-02-02T15:35:24.152680 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(5d7eae38) START. Requested: 444. Buffer: 474 bytes.
2026-02-02T15:35:24.156680 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(5d7eae38) END (from buffer). Returning 444 bytes: 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. Buffer after: 30 bytes: 001c4fe9f2191bb33f53f712506a71b29e773c3082981bf1b874254d7a40
2026-02-02T15:35:24.156680 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 444 bytes. First 4 bytes: [61, 155, 27, 222]
2026-02-02T15:35:24.156680 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 444, Got: 444
2026-02-02T15:35:24.156680 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 444, Bytes: 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
2026-02-02T15:35:24.156680 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 444
2026-02-02T15:35:24.156680 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(428) and MAC(16)
2026-02-02T15:35:24.157684 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 3d9b1bde1fa84a46836e7616560bc62c2e24c3a4d0f91dfe519ab1aa21fcc70cb47680cc4281e68f4b798ab77f3f3f904c167818a381a1aecc0465bed385840ffb1d62fb65bbc95fd24e8f89f26b9c5d8ac11adb37a740d80da957c5d7b259c6164baa26767bdcc35b07073f7451c2d43d1ac6f2ecdcedb1724dd9a37082dcffec1e89e4f43ed72fb458bbadd2713a57c63ac113823696167b0bfb3a50cb1dd9f0920a54bab2cbd824d233f44baa7142f5ca60256cecc83c5556a759533f83093df401336bcbf7f895fed45630fca698ff0e44d2e77642321e4f7794c533fced6d574e6ce83c2bda8e476558ee5276902e4e490cbcc04d38b5101f4067aba202fe50883575e50fadf68ebe6e741b64dd578095a21be7b31560970254af3f322c086030bc7f7fa7a1699daceb672a6a6b2896733f6fd821bf44bb8d06d1d48348acebf933ebf5ef64d4533cb189abf2d39470c421c3741eaa0d4a7df011a6355340a4ddb1f661f80a313cb991b9ec78cc6ebe77379ace9427c6c980fa6b9ec24fc64db429de155fea0cd9af04aac11561b8f7b2bc1163a987fd71b836bd4aa7e69552e3d3dd1acb10f91b54b8
2026-02-02T15:35:24.157684 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: ca6fd7ace43b5395d6215b6c153004c4
2026-02-02T15:35:24.157684 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [61, 155, 27, 222]
2026-02-02T15:35:24.157684 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [202, 111, 215, 172]
2026-02-02T15:35:24.157684 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [202, 111, 215, 172, 228, 59, 83, 149, 214, 33, 91, 108, 21, 48, 4, 196]
2026-02-02T15:35:24.157684 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:24.157684 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057631109): [246, 86, 79, 234, 182, 115, 65, 161, 120, 86, 220, 213, 67, 111, 234, 254, 217, 86, 38, 54, 78, 4, 110, 90, 49, 22, 192, 117, 230, 220, 95, 247]
2026-02-02T15:35:24.158684 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 428 bytes
2026-02-02T15:35:24.158684 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 428 bytes to _decryptedBuffer. New _decryptedBuffer.length: 428
2026-02-02T15:35:24.158684 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 416. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 160]
2026-02-02T15:35:24.158684 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:24.158684 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:24.158684 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=416
2026-02-02T15:35:24.158684 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.158684 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.159684 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.159684 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=416
2026-02-02T15:35:24.159684 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 416, _decryptedBuffer.length: 416
2026-02-02T15:35:24.159684 [FINER] [SecuredConnection] SecuredConnection.read (length=416): Returning 416 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [158, 3, 10, 36, 8, 1, 18, 32, 211, 0, 134, 82, 217, 167, 171, 89, 31, 66, 181, 252]
2026-02-02T15:35:24.159684 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=416
2026-02-02T15:35:24.159684 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:24.159684 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 416, flags: 0
2026-02-02T15:35:24.159684 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 416 bytes directly to waiting reader
2026-02-02T15:35:24.159684 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 452
2026-02-02T15:35:24.160683 [FINE] [identify]  [READ-ALL-ID-MESSAGES] Parsed identify from peer=12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, 414 bytes, duration=18ms
2026-02-02T15:35:24.165681 [FINE] [identify] IdentifyService._consumeMessage: Consuming identify message from 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. IsPush: false.
2026-02-02T15:35:24.166682 [FINER] [identify] IdentifyService._consumeMessage: Current known protocols for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: 0
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.167681 [FINER] [identify] IdentifyService._filterAddrs: Filtering 2 addresses based on remote address type: /ip4/127.0.0.1/tcp/4502 (Loopback: true, Private: false, Public: false)
2026-02-02T15:35:24.168680 [FINER] [identify] IdentifyService._filterAddrs: Remote is loopback, returning all addresses.
2026-02-02T15:35:24.168680 [FINER] [identify] IdentifyService._consumeMessage: After filter for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah: 2
2026-02-02T15:35:24.168680 [FINE] [identify] IdentifyService._consumeMessage: Adding 2 addresses for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah to peerstore with TTL 875976:00:00.000000.
2026-02-02T15:35:24.169680 [FINER] [identify] IdentifyService._consumeMessage: Updating TempAddrTTL to zero for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.174206 [FINER] [identify] IdentifyService._consumeMessage: Received protocols from 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: 6
2026-02-02T15:35:24.175205 [FINER] [identify] IdentifyService._diff: Calculating protocol diff. Before: 0, After: 6
2026-02-02T15:35:24.175205 [FINER] [identify] IdentifyService._diff: Added: 6, Removed: 0
2026-02-02T15:35:24.175205 [FINE] [identify] IdentifyService._consumeMessage: For peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - Added protocols: 6, Removed protocols: 0
2026-02-02T15:35:24.177205 [FINE] [identify] IdentifyService._consumeMessage: Parsed observed address for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: /ip4/127.0.0.1/tcp/58646
2026-02-02T15:35:24.177205 [FINE] [identify] IdentifyService._consumeMessage: Recording observed address /ip4/127.0.0.1/tcp/58646 for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw via conn 0.
2026-02-02T15:35:24.178204 [FINER] [identify] IdentifyService._consumeMessage: Processing 2 listen addresses from 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:24.179710 [FINE] [identify] IdentifyService._consumeMessage: Parsed 2 listen addresses for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:24.179710 [FINER] [identify] IdentifyService._consumeMessage: Attempting to parse signed peer record for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw (181 bytes).
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.180713 [FINE] [identify] IdentifyService._consumeMessage: Storing metadata for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah: ProtocolVersion=ipfs/0.1.0, AgentVersion=dart-libp2p/0.1.0
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.180713 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Checking for signed peer record.
2026-02-02T15:35:24.180713 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Attempting to consume envelope from 181 bytes.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.181715 [FINER] [identify] IdentifyService._consumeMessage: Consuming received public key for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
2026-02-02T15:35:24.183714 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Consuming public key for remote peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah from local peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
2026-02-02T15:35:24.183714 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Received 36 bytes for public key of 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
2026-02-02T15:35:24.184712 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Successfully unmarshalled public key for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
2026-02-02T15:35:24.184712 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah from received public key for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
2026-02-02T15:35:24.185216 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah matches expected remote peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
2026-02-02T15:35:24.186221 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Existing public key found for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah. Comparing with received key.
2026-02-02T15:35:24.186221 [FINE] [identify] IdentifyService._consumeReceivedPubKey: Received public key for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah matches existing key in peerstore.
2026-02-02T15:35:24.192218 [FINE] [identify] IdentifyService._consumeMessage: Finished consuming message from 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
2026-02-02T15:35:24.193218 [FINER] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Checking push support for 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah in peerstore.
2026-02-02T15:35:24.196218 [FINE] [autonatv2] Peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah identification completed, updating peer map
2026-02-02T15:35:24.198216 [FINE] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah supports push.
2026-02-02T15:35:24.198216 [FINER] [YamuxStream] [1][Client] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:35:24.198216 [FINER] [YamuxStream] [1][Client] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:35:24.198216 [FINE] [autonatv2] Updating peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah: protocols=[/ipfs/id/1.0.0, /ipfs/id/push/1.0.0, /ipfs/ping/1.0.0, /libp2p/autonat/2/dial-back, /libp2p/autonat/2/dial-request, /libp2p/dcutr, /test/broadcast/1.0.0], connectedness=Connectedness.connected
2026-02-02T15:35:24.198216 [FINE] [autonatv2] Adding peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah to AutoNAT v2 peer map (supports /libp2p/autonat/2/dial-request)
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.199217 [FINE] [identify] IdentifyService.signedPeerRecordFromMessage: Successfully consumed envelope.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.200216 [FINE] [ambient_autonat_v2] Peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah supports AutoNAT v2, scheduling probe
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.200216 [FINE] [identify] IdentifyService._consumeMessage: Parsed signed peer record for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: true
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.200216 [FINE] [ambient_autonat_v2] Scheduling probe in 2s (force: true, status: Reachability.unknown, confidence: 0)
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.200216 [FINER] [identify] IdentifyService._consumeMessage: Connectedness for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: Connectedness.connected. Default TTL: 4:00:00.000000
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.200216 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.200216 [FINER] [identify] IdentifyService._consumeMessage: Peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw is connected/limited, using TTL: 875976:00:00.000000
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.200216 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.201215 [FINER] [identify] IdentifyService._consumeMessage: Updating address book for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. Current TTLs: RecentlyConnectedAddrTTL=4:00:00.000000, ConnectedAddrTTL=875976:00:00.000000, TempAddrTTL=0:02:00.000000.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.201215 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:24.201215 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:24.201215 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 30 bytes: 001c345928618745a724c83b583682bf9c79afc4c6e034ee87048e13ba14
2026-02-02T15:35:24.202217 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 30 bytes successfully. Data preview (hex): 001c345928618745a724c83b583682bf9c79afc4...
2026-02-02T15:35:24.202217 [FINE] [YamuxStream] [1][Client] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:35:24.202217 [FINE] [YamuxStream] [1][Client] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:35:24.206214 [FINE] [identify]  [SPAWN-IDENTIFY-SUCCESS] Identify succeeded for peer=12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah, duration=388ms
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.206214 [FINER] [identify] IdentifyService._consumeMessage: Consuming signed peer record for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:24.208214 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Consuming signed record for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.217425 [FINE] [Libp2pRouter] [DEBUG] Connected to peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:24.218424 [FINE] [Libp2pRouter] [DEBUG] Connecting to /ip4/127.0.0.1/tcp/4503/p2p/12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:24.219423 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C, existing_conns=1
2026-02-02T15:35:24.219423 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C"
2026-02-02T15:35:24.224430 [FINE] [Swarm] Found 0 existing connections for peer ID string: "12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C"
2026-02-02T15:35:24.224430 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C. Dialing.
2026-02-02T15:35:24.224430 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:24.225434 [FINE] [Swarm] Dialing 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.229432 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Derived PeerId 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw from record public key for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.233431 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:24.234430 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.234430 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.234430 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.234430 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:24.234430 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:24.234430 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:24.234430 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:24.235430 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:24.235430 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(4f667606) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:24.236429 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(4f667606) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 0104361e25b924737ebbac212a200646fc0006647c918d11332486b4
2026-02-02T15:35:24.238429 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:24.239428 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.239428 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Obtained record from envelope for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.239428 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:24.241428 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:24.242427 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.242427 [FINE] [identify] IdentifyService._consumeSignedPeerRecord: Successfully consumed signed peer record for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. Found 2 addresses.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.243427 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:24.244426 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:24.247425 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(19b13bd3) START. Requested: 28. Buffer: 28 bytes.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.248427 [FINE] [identify] IdentifyService._consumeMessage: Addresses from signed peer record for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: 2
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.248427 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(19b13bd3) END (from buffer). Returning 28 bytes: 0104361e25b924737ebbac212a200646fc0006647c918d11332486b4. Buffer after: 0 bytes: 
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.248427 [FINER] [identify] IdentifyService._consumeMessage: Filtering addresses for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw based on remote connection address /ip4/127.0.0.1/tcp/4102. Before filter: 2
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.248427 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [1, 4, 54, 30]
2026-02-02T15:35:24.248427 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:24.248427 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 0104361e25b924737ebbac212a200646fc0006647c918d11332486b4
2026-02-02T15:35:24.249426 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:24.249426 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:24.249426 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 0104361e25b924737ebbac21
2026-02-02T15:35:24.249426 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2a200646fc0006647c918d11332486b4
2026-02-02T15:35:24.250425 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [1, 4, 54, 30]
2026-02-02T15:35:24.250425 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [42, 32, 6, 70]
2026-02-02T15:35:24.250425 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [42, 32, 6, 70, 252, 0, 6, 100, 124, 145, 141, 17, 51, 36, 134, 180]
2026-02-02T15:35:24.251425 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:24.251425 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059730016): [10, 32, 200, 192, 148, 10, 84, 24, 166, 217, 78, 62, 33, 82, 238, 247, 120, 174, 240, 98, 43, 63, 125, 98, 100, 221, 181, 185, 93, 226, 221, 227]
2026-02-02T15:35:24.251425 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:35:24.251425 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:24.252158 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:24.252158 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:24.252158 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:24.252158 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:24.252158 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:35:24.252158 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:35:24.263168 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c345928618745a724c83b583682bf9c79afc4c6e034ee87048e13ba14
2026-02-02T15:35:24.263168 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(2426293e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:24.263168 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(2426293e) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 345928618745a724c83b583682bf9c79afc4c6e034ee87048e13ba14
2026-02-02T15:35:24.263168 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:24.263168 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:24.264167 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:24.264167 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:24.265166 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:24.265166 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:24.266166 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:24.266166 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(f152ed67) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:24.266166 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(f152ed67) END (from buffer). Returning 28 bytes: 345928618745a724c83b583682bf9c79afc4c6e034ee87048e13ba14. Buffer after: 0 bytes: 
2026-02-02T15:35:24.266166 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [52, 89, 40, 97]
2026-02-02T15:35:24.266166 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:24.266166 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 345928618745a724c83b583682bf9c79afc4c6e034ee87048e13ba14
2026-02-02T15:35:24.266166 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:24.267165 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:24.267165 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 345928618745a724c83b5836
2026-02-02T15:35:24.267165 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 82bf9c79afc4c6e034ee87048e13ba14
2026-02-02T15:35:24.267165 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [52, 89, 40, 97]
2026-02-02T15:35:24.267165 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [130, 191, 156, 121]
2026-02-02T15:35:24.267165 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [130, 191, 156, 121, 175, 196, 198, 224, 52, 238, 135, 4, 142, 19, 186, 20]
2026-02-02T15:35:24.267165 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:24.267165 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064635575): [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
2026-02-02T15:35:24.268165 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 12 bytes
2026-02-02T15:35:24.268165 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:24.268165 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:24.268165 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:24.268165 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:24.268165 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:24.268165 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:35:24.268165 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:35:24.272671 [FINE] [HappyEyeballsDialer] Attempting /ip4/127.0.0.1/tcp/4503 (priority 1)
2026-02-02T15:35:24.274175 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C at /ip4/127.0.0.1/tcp/4503
2026-02-02T15:35:24.300171 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:24.300171 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.300171 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.301170 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.301170 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:24.302170 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:24.302170 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:24.303170 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:24.306169 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:24.306169 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(10e9e065) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:24.306169 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(10e9e065) ASYNC WAIT. Requested: 2. Buffer: 0
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.397651 [FINER] [identify] IdentifyService._filterAddrs: Filtering 2 addresses based on remote address type: /ip4/127.0.0.1/tcp/4102 (Loopback: true, Private: false, Public: false)
2026-02-02T15:35:24.398650 [FINER] [identify] IdentifyService._filterAddrs: Remote is loopback, returning all addresses.
2026-02-02T15:35:24.398650 [FINER] [identify] IdentifyService._consumeMessage: After filter for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: 2
2026-02-02T15:35:24.398650 [FINE] [identify] IdentifyService._consumeMessage: Adding 2 addresses for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw to peerstore with TTL 875976:00:00.000000.
2026-02-02T15:35:24.398650 [FINER] [identify] IdentifyService._consumeMessage: Updating TempAddrTTL to zero for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:24.399649 [FINE] [identify] IdentifyService._consumeMessage: Storing metadata for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: ProtocolVersion=ipfs/0.1.0, AgentVersion=dart-libp2p/0.1.0
2026-02-02T15:35:24.400649 [FINER] [identify] IdentifyService._consumeMessage: Consuming received public key for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:24.402648 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Consuming public key for remote peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw from local peer 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos.
2026-02-02T15:35:24.402648 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Received 36 bytes for public key of 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:24.403648 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Successfully unmarshalled public key for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:24.403648 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw from received public key for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:24.403648 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw matches expected remote peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:24.404648 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Existing public key found for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. Comparing with received key.
2026-02-02T15:35:24.404648 [FINE] [identify] IdentifyService._consumeReceivedPubKey: Received public key for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw matches existing key in peerstore.
2026-02-02T15:35:24.405649 [FINE] [identify] IdentifyService._consumeMessage: Finished consuming message from 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:24.406647 [FINER] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Checking push support for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw in peerstore.
2026-02-02T15:35:24.408645 [FINE] [autonatv2] Peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw identification completed, updating peer map
2026-02-02T15:35:24.417432 [FINE] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw supports push.
2026-02-02T15:35:24.417432 [FINER] [YamuxStream] [1][Client] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:35:24.417432 [FINER] [YamuxStream] [1][Client] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:35:24.418437 [FINE] [autonatv2] Updating peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: protocols=[/ipfs/id/1.0.0, /ipfs/id/push/1.0.0, /ipfs/ping/1.0.0, /libp2p/autonat/2/dial-back, /libp2p/autonat/2/dial-request, /libp2p/dcutr], connectedness=Connectedness.connected
2026-02-02T15:35:24.418437 [FINE] [autonatv2] Adding peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw to AutoNAT v2 peer map (supports /libp2p/autonat/2/dial-request)
2026-02-02T15:35:24.419436 [FINE] [ambient_autonat_v2] Peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw supports AutoNAT v2, scheduling probe
2026-02-02T15:35:24.419436 [FINE] [ambient_autonat_v2] Scheduling probe in 2s (force: true, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:24.419436 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:24.420436 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:35:24.420436 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:24.420436 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:24.421436 [FINER] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Writing 30 bytes: 001c63da88739c17b84775286fbc84fe345720930d8dde2a1eb934d46385
2026-02-02T15:35:24.421436 [FINEST] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Flushed 30 bytes successfully. Data preview (hex): 001c63da88739c17b84775286fbc84fe34572093...
2026-02-02T15:35:24.421436 [FINE] [YamuxStream] [1][Client] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:35:24.421436 [FINE] [YamuxStream] [1][Client] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:35:24.423434 [FINE] [identify]  [SPAWN-IDENTIFY-SUCCESS] Identify succeeded for peer=12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, duration=449ms
2026-02-02T15:35:24.424434 [FINE] [Libp2pRouter] [DEBUG] Connected to peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:24.424434 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:24.424434 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.425435 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.425435 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.425435 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:24.425435 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:24.425435 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:24.425435 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:24.425435 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:24.425435 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(9b5cc740) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:24.425435 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(9b5cc740) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 4fe9f2191bb33f53f712506a71b29e773c3082981bf1b874254d7a40
2026-02-02T15:35:24.426433 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:24.427433 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:24.427433 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:24.427433 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:24.427433 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:24.427433 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:24.427937 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:24.428940 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(cf3c912c) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:24.428940 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(cf3c912c) END (from buffer). Returning 28 bytes: 4fe9f2191bb33f53f712506a71b29e773c3082981bf1b874254d7a40. Buffer after: 0 bytes: 
2026-02-02T15:35:24.428940 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [79, 233, 242, 25]
2026-02-02T15:35:24.428940 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:24.428940 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 4fe9f2191bb33f53f712506a71b29e773c3082981bf1b874254d7a40
2026-02-02T15:35:24.428940 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:24.429940 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:24.429940 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 4fe9f2191bb33f53f712506a
2026-02-02T15:35:24.429940 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 71b29e773c3082981bf1b874254d7a40
2026-02-02T15:35:24.430939 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [79, 233, 242, 25]
2026-02-02T15:35:24.430939 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [113, 178, 158, 119]
2026-02-02T15:35:24.431939 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [113, 178, 158, 119, 60, 48, 130, 152, 27, 241, 184, 116, 37, 77, 122, 64]
2026-02-02T15:35:24.438937 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:24.438937 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057631109): [246, 86, 79, 234, 182, 115, 65, 161, 120, 86, 220, 213, 67, 111, 234, 254, 217, 86, 38, 54, 78, 4, 110, 90, 49, 22, 192, 117, 230, 220, 95, 247]
2026-02-02T15:35:24.439937 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:35:24.439937 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:24.439937 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:24.439937 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:24.439937 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:24.439937 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:24.439937 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:35:24.439937 [FINE] [YamuxStream] [1][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.451933 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:24.452934 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.452934 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.452934 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.452934 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:24.452934 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:24.452934 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:24.452934 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:24.452934 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:24.453933 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(ff5bb8bd) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:24.453933 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(ff5bb8bd) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:24.459935 [FINE] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) CREATED. IsServer: true, Direction: Direction.inbound. Socket Local: 0.0.0.0:4503, Socket Remote: 127.0.0.1:58647
2026-02-02T15:35:24.460935 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068124459-2567
2026-02-02T15:35:24.460935 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:24.460935 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(301dbf3c) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:24.460935 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(301dbf3c) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:24.468867 [FINE] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) CREATED. IsServer: false, Direction: Direction.outbound. Socket Local: 127.0.0.1:58647, Socket Remote: 127.0.0.1:4503
2026-02-02T15:35:24.468867 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068124468-6095
2026-02-02T15:35:24.469879 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWRdFQzcFckVccKHzatrikD8YkuTegbKszE7R83qtDCGCM
2026-02-02T15:35:24.470878 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:24.470878 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:35:24.470878 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(1662e0ea) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:24.472383 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(1662e0ea) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:24.540777 [FINEST] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:24.540777 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(301dbf3c) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:24.540777 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(301dbf3c) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:35:24.540777 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:24.540777 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:24.540777 [FINER] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:24.546982 [FINEST] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:24.547983 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(1662e0ea) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:24.547983 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(1662e0ea) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:35:24.547983 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:35:24.547983 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:35:24.547983 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(8d8752bd) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:24.547983 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(8d8752bd) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:24.548983 [FINEST] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.548983 [FINEST] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c63da88739c17b84775286fbc84fe345720930d8dde2a1eb934d46385
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.548983 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.548983 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(064fb537) ASYNC AWOKE. Re-checking buffer.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.548983 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:24.549489 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(c6f93f1e) START. Requested: null. Buffer: 0 bytes.
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.549489 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(064fb537) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 63da88739c17b84775286fbc84fe345720930d8dde2a1eb934d46385
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.549489 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(c6f93f1e) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:24.549489 [FINEST] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:35:24.550493 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(c6f93f1e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:24.550493 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(c6f93f1e) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.549489 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.550493 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/noise"
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.550493 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.550493 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/noise"
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.550493 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:24.550493 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.550493 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/noise". Sending acknowledgment: "/noise".
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.550493 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:24.550493 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.550493 [FINER] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Writing 8 bytes: 072f6e6f6973650a
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.550493 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.551493 [FINEST] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.551493 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(091232e0) START. Requested: 28. Buffer: 28 bytes.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.551493 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/noise".
2026-02-02T15:35:24.551493 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/noise" and its handler.
2026-02-02T15:35:24.552493 [FINE] [multistream] [multistreamMuxer - handle] Protocol /noise negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:24.552493 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /noise on stream scope and stream. Proceeding to call handler.
2026-02-02T15:35:24.557490 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(123677e7) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:24.557490 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(123677e7) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:24.557490 [FINEST] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:35:24.558494 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(8d8752bd) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:24.558494 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(8d8752bd) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:35:24.579996 [INFO] [NoiseProtocol] secureOutbound: Writing msg1 (e): 32 bytes
2026-02-02T15:35:24.581995 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 34 bytes: 0020aadf4e6f85166f0e680d2f2a43cd7211431f0b32da0f15e629ae199fbd3c296c
2026-02-02T15:35:24.582994 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 34 bytes successfully. Data preview (hex): 0020aadf4e6f85166f0e680d2f2a43cd7211431f...
2026-02-02T15:35:24.583993 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(d4c5bd9d) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:24.583993 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(d4c5bd9d) ASYNC WAIT. Requested: 2. Buffer: 0
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.676403 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(091232e0) END (from buffer). Returning 28 bytes: 63da88739c17b84775286fbc84fe345720930d8dde2a1eb934d46385. Buffer after: 0 bytes: 
2026-02-02T15:35:24.676403 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [99, 218, 136, 115]
2026-02-02T15:35:24.676909 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:24.676909 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 63da88739c17b84775286fbc84fe345720930d8dde2a1eb934d46385
2026-02-02T15:35:24.676909 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:24.677923 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:24.677923 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 63da88739c17b84775286fbc
2026-02-02T15:35:24.677923 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 84fe345720930d8dde2a1eb934d46385
2026-02-02T15:35:24.678922 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [99, 218, 136, 115]
2026-02-02T15:35:24.678922 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [132, 254, 52, 87]
2026-02-02T15:35:24.678922 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [132, 254, 52, 87, 32, 147, 13, 141, 222, 42, 30, 185, 52, 212, 99, 133]
2026-02-02T15:35:24.678922 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:24.678922 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1060023569): [105, 157, 36, 165, 38, 0, 57, 38, 136, 226, 64, 234, 15, 196, 99, 77, 12, 54, 66, 167, 236, 175, 117, 8, 8, 119, 94, 20, 9, 239, 23, 88]
2026-02-02T15:35:24.679921 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 12 bytes
2026-02-02T15:35:24.679921 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:24.679921 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:24.679921 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:24.679921 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:24.679921 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:24.679921 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:35:24.679921 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:35:24.690428 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:24.697425 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.698425 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.698425 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.699425 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:24.699425 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:24.700424 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:24.700424 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:24.701424 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:24.701424 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(b72cfce6) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:24.701424 [FINER] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Read(b72cfce6) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:24.761409 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:24.761409 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:24.761409 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:24.762408 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:24.762408 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:24.763408 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:24.763408 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:24.763408 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:24.763408 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:24.763408 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(6af84d79) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:24.763408 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(6af84d79) ASYNC WAIT. Requested: 2. Buffer: 0
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.834960 [FINEST] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - RAW_SOCKET_DATA_CHUNK_RECV (34 bytes): 0020aadf4e6f85166f0e680d2f2a43cd7211431f0b32da0f15e629ae199fbd3c296c
2026-02-02T15:35:24.835958 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(123677e7) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:24.835958 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(123677e7) END (from buffer). Returning 2 bytes: 0020. Buffer after: 32 bytes: aadf4e6f85166f0e680d2f2a43cd7211431f0b32da0f15e629ae199fbd3c296c
2026-02-02T15:35:24.835958 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(f6388f04) START. Requested: 32. Buffer: 32 bytes.
2026-02-02T15:35:24.835958 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(f6388f04) END (from buffer). Returning 32 bytes: aadf4e6f85166f0e680d2f2a43cd7211431f0b32da0f15e629ae199fbd3c296c. Buffer after: 0 bytes: 
2026-02-02T15:35:24.835958 [INFO] [NoiseProtocol] secureInbound: Read msg1 (e): 32 bytes
2026-02-02T15:35:24.858318 [INFO] [NoiseProtocol] secureInbound: Writing msg2 (e,ee,s,es + payload): 200 bytes
2026-02-02T15:35:24.858318 [FINER] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Writing 202 bytes: 00c890a0ef49f20ab581aa554e4b7af7360208cbcb5f9c16f0cc7d51c6a592eb654175401b8de44aa721827e88feb182bdf7fc6047ca385d39236d72c549b5ebbc70327af8c8e9e3075358a339f2be6661f66e9cde6d896bbaaec4d681e706f50fbcfd59267f22814d368997c9d9aa867ee7806d5736e991d49e8846caf7cd4b762040754669a7311b697af862116c76ea825859e702278aef55f92d3fde140bfb3423e8de13e6309c7a965168696653a8c204922fb5b0745c19e4e28abd9f811c5a46c4b21c1563f06c
2026-02-02T15:35:24.859320 [FINEST] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Flushed 202 bytes successfully. Data preview (hex): 00c890a0ef49f20ab581aa554e4b7af7360208cb...
2026-02-02T15:35:24.860318 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(891c8957) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:24.860318 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(891c8957) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:24.909027 [FINEST] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - RAW_SOCKET_DATA_CHUNK_RECV (202 bytes): 00c890a0ef49f20ab581aa554e4b7af7360208cbcb5f9c16f0cc7d51c6a592eb654175401b8de44aa721827e88feb182bdf7fc6047ca385d39236d72c549b5ebbc70327af8c8e9e3075358a339f2be6661f66e9cde6d896bbaaec4d681e706f50fbcfd59267f22814d368997c9d9aa867ee7806d5736e991d49e8846caf7cd4b762040754669a7311b697af862116c76ea825859e702278aef55f92d3fde140bfb3423e8de13e6309c7a965168696653a8c204922fb5b0745c19e4e28abd9f811c5a46c4b21c1563f06c
2026-02-02T15:35:24.909027 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(d4c5bd9d) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:24.910026 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(d4c5bd9d) END (from buffer). Returning 2 bytes: 00c8. Buffer after: 200 bytes: 90a0ef49f20ab581aa554e4b7af7360208cbcb5f9c16f0cc7d51c6a592eb654175401b8de44aa721827e88feb182bdf7fc6047ca385d39236d72c549b5ebbc70327af8c8e9e3075358a339f2be6661f66e9cde6d896bbaaec4d681e706f50fbcfd59267f22814d368997c9d9aa867ee7806d5736e991d49e8846caf7cd4b762040754669a7311b697af862116c76ea825859e702278aef55f92d3fde140bfb3423e8de13e6309c7a965168696653a8c204922fb5b0745c19e4e28abd9f811c5a46c4b21c1563f06c
2026-02-02T15:35:24.910026 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(adb597f1) START. Requested: 200. Buffer: 200 bytes.
2026-02-02T15:35:24.911027 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(adb597f1) END (from buffer). Returning 200 bytes: 90a0ef49f20ab581aa554e4b7af7360208cbcb5f9c16f0cc7d51c6a592eb654175401b8de44aa721827e88feb182bdf7fc6047ca385d39236d72c549b5ebbc70327af8c8e9e3075358a339f2be6661f66e9cde6d896bbaaec4d681e706f50fbcfd59267f22814d368997c9d9aa867ee7806d5736e991d49e8846caf7cd4b762040754669a7311b697af862116c76ea825859e702278aef55f92d3fde140bfb3423e8de13e6309c7a965168696653a8c204922fb5b0745c19e4e28abd9f811c5a46c4b21c1563f06c. Buffer after: 0 bytes: 
2026-02-02T15:35:24.911027 [INFO] [NoiseProtocol] secureOutbound: Read msg2: 200 bytes
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.936426 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:24.936426 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:24.936426 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:24.936426 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:24.938435 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.938435 [INFO] [NoiseProtocol] secureOutbound: Writing msg3 (s,se + payload): 168 bytes
2026-02-02T15:35:24.939431 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 170 bytes: 00a80e9bd217bf9969442dd57a3f526003b648b76218ee7bec16d9aa4953e9269fcf6ad1c759e0a0da490f89101a2495d08a63ab2ba19528494b453e3fd33d448753c10cc359c03abc341f1685a4cc84db6d1d2e9c2a8eb41a3c7369f10bef82b502d5dc4ef4bebcd82c9ee006cb387cdd943b556dcd28d86d897ecfcc024719b1e2d6e1ee3727bbf20f830360da370d458468b6cfa1d740002e715a6b7a64eedd6cb134d84ebec7af5e
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.938435 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:35:24.939431 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:24.939431 [FINE] [identify] IdentifyService.close: Closing identify service.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.939431 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 170 bytes successfully. Data preview (hex): 00a80e9bd217bf9969442dd57a3f526003b648b7...
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.939431 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.939431 [INFO] [NoiseProtocol] secureOutbound: Handshake complete. Remote peer: 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.939431 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:24.939431 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.939431 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:35:24.939431 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1057500832
00:55 +909 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.939431 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
00:55 +909 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.939431 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1059142886
2026-02-02T15:35:24.940430 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
2026-02-02T15:35:24.940430 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [209, 30, 6, 24, 115, 111, 198, 202, 208, 48, 32, 79, 121, 176, 89, 189, 242, 186, 22, 223, 6, 191, 117, 175, 52, 11, 80, 60, 49, 187, 119, 146]
2026-02-02T15:35:24.940430 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:24.940430 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:35:24.940430 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:35:24.940430 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:35:24.940430 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 38 bytes: 002483242f7b300e81fa19512e247b70e7e78caeb66443f712de205eed63d1d8410f01487a3d
00:55 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage broadcastMessage should send to multiple peers
00:55 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.945428 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:24.945428 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:24.946428 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:24.946939 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:24.946939 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:24.946939 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:24.946939 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:24.946939 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:35:24.946939 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:24.946939 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:35:24.951945 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:24.951945 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
00:55 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.964760 [FINEST] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - RAW_SOCKET_DATA_CHUNK_RECV (208 bytes): 00a80e9bd217bf9969442dd57a3f526003b648b76218ee7bec16d9aa4953e9269fcf6ad1c759e0a0da490f89101a2495d08a63ab2ba19528494b453e3fd33d448753c10cc359c03abc341f1685a4cc84db6d1d2e9c2a8eb41a3c7369f10bef82b502d5dc4ef4bebcd82c9ee006cb387cdd943b556dcd28d86d897ecfcc024719b1e2d6e1ee3727bbf20f830360da370d458468b6cfa1d740002e715a6b7a64eedd6cb134d84ebec7af5e002483242f7b300e81fa19512e247b70e7e78caeb66443f712de205eed63d1d8410f01487a3d
00:55 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:24.975774 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
00:55 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:24.984328 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(891c8957) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:24.991450 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(891c8957) END (from buffer). Returning 2 bytes: 00a8. Buffer after: 206 bytes: 0e9bd217bf9969442dd57a3f526003b648b76218ee7bec16d9aa4953e9269fcf6ad1c759e0a0da490f89101a2495d08a63ab2ba19528494b453e3fd33d448753c10cc359c03abc341f1685a4cc84db6d1d2e9c2a8eb41a3c7369f10bef82b502d5dc4ef4bebcd82c9ee006cb387cdd943b556dcd28d86d897ecfcc024719b1e2d6e1ee3727bbf20f830360da370d458468b6cfa1d740002e715a6b7a64eedd6cb134d84ebec7af5e002483242f7b300e81fa19512e247b70e7e78caeb66443f712de205eed63d1d8410f01487a3d
2026-02-02T15:35:25.001171 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(46637246) START. Requested: 168. Buffer: 206 bytes.
00:55 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:25.009729 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
00:55 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:25.030730 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(46637246) END (from buffer). Returning 168 bytes: 0e9bd217bf9969442dd57a3f526003b648b76218ee7bec16d9aa4953e9269fcf6ad1c759e0a0da490f89101a2495d08a63ab2ba19528494b453e3fd33d448753c10cc359c03abc341f1685a4cc84db6d1d2e9c2a8eb41a3c7369f10bef82b502d5dc4ef4bebcd82c9ee006cb387cdd943b556dcd28d86d897ecfcc024719b1e2d6e1ee3727bbf20f830360da370d458468b6cfa1d740002e715a6b7a64eedd6cb134d84ebec7af5e. Buffer after: 38 bytes: 002483242f7b300e81fa19512e247b70e7e78caeb66443f712de205eed63d1d8410f01487a3d
2026-02-02T15:35:25.030730 [INFO] [NoiseProtocol] secureInbound: Read msg3: 168 bytes
00:55 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:25.032731 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:25.037727 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:25.038727 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:25.039232 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:25.040238 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:25.041236 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:25.041236 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom - Initial _network.listenAddresses: []
2026-02-02T15:35:25.041236 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom, Host hashCode: 483988480
2026-02-02T15:35:25.042236 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:25.042236 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:25.042236 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:25.042236 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:25.042236 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:25.043237 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
00:55 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:25.045858 [INFO] [NoiseProtocol] secureInbound: Handshake complete. Remote peer: 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:25.049814 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:35:25.050318 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1059142886
2026-02-02T15:35:25.050318 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1057500832
2026-02-02T15:35:25.050318 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:25.050318 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:25.051083 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.051083 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.051083 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [209, 30, 6, 24, 115, 111, 198, 202, 208, 48, 32, 79, 121, 176, 89, 189, 242, 186, 22, 223, 6, 191, 117, 175, 52, 11, 80, 60, 49, 187, 119, 146]
2026-02-02T15:35:25.051588 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
2026-02-02T15:35:25.052106 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.052106 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:25.052106 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:25.052106 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:25.052106 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:25.052106 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(6999b101) START. Requested: 2. Buffer: 38 bytes.
2026-02-02T15:35:25.052106 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(6999b101) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 83242f7b300e81fa19512e247b70e7e78caeb66443f712de205eed63d1d8410f01487a3d
2026-02-02T15:35:25.053117 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:35:25.053117 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:25.053117 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:35:25.053117 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:35:25.053117 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:35:25.053117 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:35:25.053775 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:35:25.054289 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(473107d8) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:35:25.054289 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(473107d8) END (from buffer). Returning 36 bytes: 83242f7b300e81fa19512e247b70e7e78caeb66443f712de205eed63d1d8410f01487a3d. Buffer after: 0 bytes: 
2026-02-02T15:35:25.054289 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [131, 36, 47, 123]
2026-02-02T15:35:25.054289 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:35:25.054289 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 83242f7b300e81fa19512e247b70e7e78caeb66443f712de205eed63d1d8410f01487a3d
2026-02-02T15:35:25.054289 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:35:25.054289 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:35:25.054289 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 83242f7b300e81fa19512e247b70e7e78caeb664
2026-02-02T15:35:25.054289 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 43f712de205eed63d1d8410f01487a3d
2026-02-02T15:35:25.054289 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [131, 36, 47, 123]
2026-02-02T15:35:25.055804 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [67, 247, 18, 222]
2026-02-02T15:35:25.055804 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [67, 247, 18, 222, 32, 94, 237, 99, 209, 216, 65, 15, 1, 72, 122, 61]
2026-02-02T15:35:25.055804 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:25.055804 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057500832): [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
2026-02-02T15:35:25.055804 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:35:25.055804 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:25.056821 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:25.056821 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.056821 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:25.056821 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:25.056821 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:25.056821 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:35:25.059054 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:35:25.059054 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:35:25.059054 [FINER] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Writing 38 bytes: 00242058d1384d2a23ac013650683de5fef36d7ee0f9291ade0ecbea8d5204b01335e535af53
2026-02-02T15:35:25.059054 [FINEST] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Flushed 38 bytes successfully. Data preview (hex): 00242058d1384d2a23ac013650683de5fef36d7e...
2026-02-02T15:35:25.059054 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:25.059054 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:25.059054 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:25.059054 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.060082 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.060082 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.060082 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:25.060082 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:25.060082 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:25.060082 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:25.060082 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(71843ce2) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:25.060082 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(71843ce2) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:25.060082 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 38 bytes successfully. Data preview (hex): 002483242f7b300e81fa19512e247b70e7e78cae...
2026-02-02T15:35:25.061082 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:25.061082 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.061082 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.061082 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.061082 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:25.061082 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:25.061082 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:25.061082 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:25.061082 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(4fc2ebde) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:25.061082 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(4fc2ebde) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:25.064080 [FINEST] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 00242058d1384d2a23ac013650683de5fef36d7ee0f9291ade0ecbea8d5204b01335e535af53
2026-02-02T15:35:25.065080 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(4fc2ebde) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:25.065080 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(4fc2ebde) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 2058d1384d2a23ac013650683de5fef36d7ee0f9291ade0ecbea8d5204b01335e535af53
2026-02-02T15:35:25.065080 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:35:25.065080 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:25.065080 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:35:25.065080 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:35:25.065080 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:35:25.065080 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:35:25.066080 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:35:25.066080 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(fc7e56cb) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:35:25.066080 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(fc7e56cb) END (from buffer). Returning 36 bytes: 2058d1384d2a23ac013650683de5fef36d7ee0f9291ade0ecbea8d5204b01335e535af53. Buffer after: 0 bytes: 
2026-02-02T15:35:25.066080 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [32, 88, 209, 56]
2026-02-02T15:35:25.066080 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:35:25.066080 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 2058d1384d2a23ac013650683de5fef36d7ee0f9291ade0ecbea8d5204b01335e535af53
2026-02-02T15:35:25.066080 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:35:25.066080 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:35:25.066080 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 2058d1384d2a23ac013650683de5fef36d7ee0f9
2026-02-02T15:35:25.066080 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 291ade0ecbea8d5204b01335e535af53
2026-02-02T15:35:25.067080 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [32, 88, 209, 56]
2026-02-02T15:35:25.067080 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [41, 26, 222, 14]
2026-02-02T15:35:25.067080 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [41, 26, 222, 14, 203, 234, 141, 82, 4, 176, 19, 53, 229, 53, 175, 83]
2026-02-02T15:35:25.067080 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:25.067080 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059142886): [209, 30, 6, 24, 115, 111, 198, 202, 208, 48, 32, 79, 121, 176, 89, 189, 242, 186, 22, 223, 6, 191, 117, 175, 52, 11, 80, 60, 49, 187, 119, 146]
2026-02-02T15:35:25.067080 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:35:25.067080 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:25.068079 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:25.068079 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.068079 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:25.068079 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:35:25.068079 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:35:25.069079 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:35:25.069079 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 32 bytes: 001e477cc41f6bfb9d0261df3b8b229b2cb0584382af6557728e8f90abf0779d
2026-02-02T15:35:25.069584 [FINEST] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e477cc41f6bfb9d0261df3b8b229b2cb0584382af6557728e8f90abf0779d
2026-02-02T15:35:25.070089 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(71843ce2) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:25.070089 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(71843ce2) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 477cc41f6bfb9d0261df3b8b229b2cb0584382af6557728e8f90abf0779d
2026-02-02T15:35:25.070089 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:35:25.070089 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:25.070089 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:35:25.070089 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:35:25.070089 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:35:25.070089 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:35:25.071103 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:35:25.071103 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(ca8d5acf) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:35:25.071103 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(ca8d5acf) END (from buffer). Returning 30 bytes: 477cc41f6bfb9d0261df3b8b229b2cb0584382af6557728e8f90abf0779d. Buffer after: 0 bytes: 
2026-02-02T15:35:25.071103 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [71, 124, 196, 31]
2026-02-02T15:35:25.071103 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:35:25.076777 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 477cc41f6bfb9d0261df3b8b229b2cb0584382af6557728e8f90abf0779d
2026-02-02T15:35:25.077282 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:35:25.077282 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:35:25.077282 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 477cc41f6bfb9d0261df3b8b229b
2026-02-02T15:35:25.077282 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2cb0584382af6557728e8f90abf0779d
2026-02-02T15:35:25.077282 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [71, 124, 196, 31]
2026-02-02T15:35:25.078294 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [44, 176, 88, 67]
2026-02-02T15:35:25.078294 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [44, 176, 88, 67, 130, 175, 101, 87, 114, 142, 143, 144, 171, 240, 119, 157]
2026-02-02T15:35:25.078294 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:25.078294 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057500832): [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
2026-02-02T15:35:25.078294 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:35:25.078294 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:25.078294 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:25.078294 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.079295 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/yamux/1.0.0"
2026-02-02T15:35:25.079295 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/yamux/1.0.0"
2026-02-02T15:35:25.079295 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/yamux/1.0.0". Sending acknowledgment: "/yamux/1.0.0".
2026-02-02T15:35:25.079295 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:25.079295 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:35:25.080294 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:35:25.080294 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:35:25.080294 [FINER] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Writing 32 bytes: 001e614967f33031c8aa65dd3c6fd4a56435036ca4c58247fd2e9862f0390797
2026-02-02T15:35:25.081294 [FINEST] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Flushed 32 bytes successfully. Data preview (hex): 001e614967f33031c8aa65dd3c6fd4a56435036c...
2026-02-02T15:35:25.081294 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/yamux/1.0.0".
2026-02-02T15:35:25.081294 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/yamux/1.0.0" and its handler.
2026-02-02T15:35:25.081294 [FINE] [multistream] [multistreamMuxer - handle] Protocol /yamux/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:25.081294 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /yamux/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:35:25.082293 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:25.082881 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068125082-2567
2026-02-02T15:35:25.083388 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:25.083388 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:35:25.084400 [FINE] [SwarmConn] SwarmConn (0): Context set: 01658635-3003-4ca3-b003-3cb299063bc8
2026-02-02T15:35:25.096444 [FINE] [Swarm] Storing inbound connection for peer=12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc, conn_id=0
2026-02-02T15:35:25.096444 [FINE] [Swarm] Connection stored. Total connections for "12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc": 1
2026-02-02T15:35:25.096444 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. Conn ID: 0, Direction: Direction.inbound
2026-02-02T15:35:25.097448 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
2026-02-02T15:35:25.097448 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. Conn ID: 0
2026-02-02T15:35:25.097448 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
2026-02-02T15:35:25.097448 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
2026-02-02T15:35:25.097448 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:25.098447 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Inbound connection from 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. This peer is the LISTENER - waiting for remote to initiate identify protocol.
2026-02-02T15:35:25.098447 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 32 bytes successfully. Data preview (hex): 001e477cc41f6bfb9d0261df3b8b229b2cb05843...
2026-02-02T15:35:25.098447 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:25.098447 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.098447 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.099447 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.099447 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:25.099447 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:25.099447 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:25.099447 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:25.099447 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(a31606a5) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:25.099447 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(a31606a5) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:25.099447 [FINEST] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e614967f33031c8aa65dd3c6fd4a56435036ca4c58247fd2e9862f0390797
2026-02-02T15:35:25.100446 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(a31606a5) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:25.100446 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(a31606a5) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 614967f33031c8aa65dd3c6fd4a56435036ca4c58247fd2e9862f0390797
2026-02-02T15:35:25.100446 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:35:25.100446 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:25.100446 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:35:25.100446 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:35:25.100446 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:35:25.100446 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:35:25.100446 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:35:25.100446 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(12b75384) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:35:25.101447 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(12b75384) END (from buffer). Returning 30 bytes: 614967f33031c8aa65dd3c6fd4a56435036ca4c58247fd2e9862f0390797. Buffer after: 0 bytes: 
2026-02-02T15:35:25.101447 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [97, 73, 103, 243]
2026-02-02T15:35:25.101447 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:35:25.101447 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 614967f33031c8aa65dd3c6fd4a56435036ca4c58247fd2e9862f0390797
2026-02-02T15:35:25.101447 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:35:25.101447 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:35:25.101447 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 614967f33031c8aa65dd3c6fd4a5
2026-02-02T15:35:25.101447 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 6435036ca4c58247fd2e9862f0390797
2026-02-02T15:35:25.101447 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [97, 73, 103, 243]
2026-02-02T15:35:25.101447 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [100, 53, 3, 108]
2026-02-02T15:35:25.101447 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [100, 53, 3, 108, 164, 197, 130, 71, 253, 46, 152, 98, 240, 57, 7, 151]
2026-02-02T15:35:25.102446 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:25.102446 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059142886): [209, 30, 6, 24, 115, 111, 198, 202, 208, 48, 32, 79, 121, 176, 89, 189, 242, 186, 22, 223, 6, 191, 117, 175, 52, 11, 80, 60, 49, 187, 119, 146]
2026-02-02T15:35:25.102446 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:35:25.102446 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:25.102446 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:25.102446 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.103446 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:25.103446 [FINE] [Swarm] Swarm._dialSingleAddr: Successfully dialed and upgraded connection to 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C at /ip4/127.0.0.1/tcp/4503
2026-02-02T15:35:25.103446 [FINE] [HappyEyeballsDialer] Connected via /ip4/127.0.0.1/tcp/4503
2026-02-02T15:35:25.103446 [FINE] [Swarm] Swarm.dialPeer: Successfully connected to 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:25.103446 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068125103-6095
2026-02-02T15:35:25.104446 [FINE] [SwarmConn] SwarmConn (1): Setting up health monitoring for connection to 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:25.104446 [FINE] [SwarmConn] SwarmConn (1): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:35:25.104446 [FINE] [SwarmConn] SwarmConn (1): Context set: f4b5b937-e6c9-4ef0-9572-1e0591995e88
2026-02-02T15:35:25.104446 [INFO] [Swarm] Swarm.dialPeer: Dial latency for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C: 879ms
2026-02-02T15:35:25.104446 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:25.104446 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.104446 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.104446 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.104446 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:25.104446 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:25.105447 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:25.105447 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:25.105447 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:25.105447 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(0e5fa378) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:25.105447 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(0e5fa378) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:25.105447 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:25.105447 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.105447 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.105447 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.105447 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:25.105447 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:25.106445 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:25.106445 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:25.106445 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:25.106445 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(be2239b1) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:25.106445 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(be2239b1) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:25.121920 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C. Conn ID: 1, Direction: Direction.outbound
2026-02-02T15:35:25.121920 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:25.122920 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C. Conn ID: 1
2026-02-02T15:35:25.122920 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:25.123920 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:25.123920 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Outbound connection to 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C. This peer is the DIALER - initiating identify protocol.
2026-02-02T15:35:25.123920 [FINE] [SwarmConn] SwarmConn.newStream (1): Entered to peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C. Context HashCode: 962975726
2026-02-02T15:35:25.123920 [FINE] [SwarmConn] SwarmConn.newStream (1): Connection is open.
2026-02-02T15:35:25.123920 [FINE] [SwarmConn] SwarmConn.newStream (1): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:35:25.123920 [FINE] [SwarmConn] SwarmConn.newStream (1): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:35:25.124919 [FINE] [YamuxStream] [3][Client] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:25.124919 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:25.124919 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:25.124919 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:35:25.124919 [FINE] [Swarm] Swarm.dialPeer: Connection established for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C. Conn ID: 1
2026-02-02T15:35:25.125919 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:25.125919 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:25.125919 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 30 bytes: 001c2679b062c9887d7ba5b209b0f1131b348d2daf6c33b70b3d4ead9326
2026-02-02T15:35:25.125919 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 30 bytes successfully. Data preview (hex): 001c2679b062c9887d7ba5b209b0f1131b348d2d...
2026-02-02T15:35:25.126918 [FINEST] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c2679b062c9887d7ba5b209b0f1131b348d2daf6c33b70b3d4ead9326
2026-02-02T15:35:25.126918 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(0e5fa378) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:25.126918 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(0e5fa378) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 2679b062c9887d7ba5b209b0f1131b348d2daf6c33b70b3d4ead9326
2026-02-02T15:35:25.126918 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:25.126918 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:25.127423 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:25.127423 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:25.127423 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:25.127423 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:25.127423 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:25.127423 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(bb778edb) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:25.127423 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(bb778edb) END (from buffer). Returning 28 bytes: 2679b062c9887d7ba5b209b0f1131b348d2daf6c33b70b3d4ead9326. Buffer after: 0 bytes: 
2026-02-02T15:35:25.127423 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [38, 121, 176, 98]
2026-02-02T15:35:25.127423 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:25.127423 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 2679b062c9887d7ba5b209b0f1131b348d2daf6c33b70b3d4ead9326
2026-02-02T15:35:25.127423 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:25.127423 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:25.127423 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 2679b062c9887d7ba5b209b0
2026-02-02T15:35:25.127423 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: f1131b348d2daf6c33b70b3d4ead9326
2026-02-02T15:35:25.128427 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [38, 121, 176, 98]
2026-02-02T15:35:25.128427 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [241, 19, 27, 52]
2026-02-02T15:35:25.128427 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [241, 19, 27, 52, 141, 45, 175, 108, 51, 183, 11, 61, 78, 173, 147, 38]
2026-02-02T15:35:25.128427 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:25.128427 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057500832): [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
2026-02-02T15:35:25.128427 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:35:25.128427 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:25.128427 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:25.129427 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:25.129427 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.130426 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:25.130426 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:35:25.132426 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:25.132426 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:25.132426 [FINER] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Writing 30 bytes: 001c288d7b7370c681804ba1474b511d0e290d1464706544a6e237f3836b
2026-02-02T15:35:25.132426 [FINEST] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Flushed 30 bytes successfully. Data preview (hex): 001c288d7b7370c681804ba1474b511d0e290d14...
2026-02-02T15:35:25.132426 [FINE] [YamuxStream] [2][Server] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:25.132426 [FINER] [YamuxStream] [2][Server] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:35:25.133426 [FINE] [YamuxStream] [2][Server] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:25.133426 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:35:25.133426 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:35:25.133426 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:25.133426 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:25.133426 [FINER] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Writing 30 bytes: 001cf909f7a6baffb2840ac7dd07a665bffd113b0f05b9fb15493fb10b8c
2026-02-02T15:35:25.133426 [FINEST] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Flushed 30 bytes successfully. Data preview (hex): 001cf909f7a6baffb2840ac7dd07a665bffd113b...
2026-02-02T15:35:25.134424 [FINER] [YamuxStream] [2][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:35:25.134424 [FINE] [Swarm] Accepted inbound stream 1 from 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc on conn 0
2026-02-02T15:35:25.134424 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068125134-6523 for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:25.134424 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:25.134424 [FINEST] [YamuxStream] [2][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:25.136424 [FINEST] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c288d7b7370c681804ba1474b511d0e290d1464706544a6e237f3836b
2026-02-02T15:35:25.137424 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(be2239b1) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:25.137931 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(be2239b1) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 288d7b7370c681804ba1474b511d0e290d1464706544a6e237f3836b
2026-02-02T15:35:25.137931 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:25.137931 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:25.137931 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:25.137931 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:25.137931 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:25.137931 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:25.137931 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:25.137931 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(39bc9e6a) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:25.138934 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(39bc9e6a) END (from buffer). Returning 28 bytes: 288d7b7370c681804ba1474b511d0e290d1464706544a6e237f3836b. Buffer after: 0 bytes: 
2026-02-02T15:35:25.138934 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [40, 141, 123, 115]
2026-02-02T15:35:25.138934 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:25.138934 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 288d7b7370c681804ba1474b511d0e290d1464706544a6e237f3836b
2026-02-02T15:35:25.138934 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:25.138934 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:25.138934 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 288d7b7370c681804ba1474b
2026-02-02T15:35:25.138934 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 511d0e290d1464706544a6e237f3836b
2026-02-02T15:35:25.138934 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [40, 141, 123, 115]
2026-02-02T15:35:25.138934 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [81, 29, 14, 41]
2026-02-02T15:35:25.139935 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [81, 29, 14, 41, 13, 20, 100, 112, 101, 68, 166, 226, 55, 243, 131, 107]
2026-02-02T15:35:25.139935 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:25.139935 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059142886): [209, 30, 6, 24, 115, 111, 198, 202, 208, 48, 32, 79, 121, 176, 89, 189, 242, 186, 22, 223, 6, 191, 117, 175, 52, 11, 80, 60, 49, 187, 119, 146]
2026-02-02T15:35:25.139935 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:35:25.139935 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:25.139935 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:25.139935 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:25.139935 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.140934 [FINER] [YamuxStream] [3][Client] StreamID=1 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:35:25.140934 [FINER] [YamuxStream] [3][Client] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:35:25.140934 [FINE] [YamuxStream] [3][Client] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:25.140934 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:35:25.140934 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:35:25.140934 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:25.140934 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:25.140934 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 30 bytes: 001c417261d5a9b42b583148d6d0e929d9bf6fdfb07771b6babd7c883c47
2026-02-02T15:35:25.141933 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 30 bytes successfully. Data preview (hex): 001c417261d5a9b42b583148d6d0e929d9bf6fdf...
2026-02-02T15:35:25.141933 [FINE] [SwarmConn] SwarmConn.newStream (1): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 1
2026-02-02T15:35:25.141933 [FINE] [SwarmConn] SwarmConn.newStream (1): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 1.
2026-02-02T15:35:25.141933 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068125141-6901 for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:25.141933 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:35:25.141933 [INFO] [ConnectionHealthMetrics] Connection health state changed: ConnectionHealthState.unknown -> ConnectionHealthState.healthy
2026-02-02T15:35:25.141933 [FINE] [identify]  [IDENTIFY-STREAM-CREATE] peer=12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C, stream_id=1, protocol=/ipfs/id/1.0.0, duration=18ms
2026-02-02T15:35:25.151659 [FINE] [YamuxStream] [3][Client] StreamID=1 setDeadline() set to 2026-02-02T15:35:55.151659
2026-02-02T15:35:25.151659 [FINE] [YamuxStream] [3][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:35:25.151659 [INFO] [SwarmConn] SwarmConn (1): Health state changed to ConnectionHealthState.healthy for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:25.152657 [INFO] [Swarm] Swarm: Connection health changed for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C (1): ConnectionHealthState.healthy -> ConnectionHealthState.healthy
2026-02-02T15:35:25.152657 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:25.152657 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:35:25.152657 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:25.153656 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:25.153656 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 50 bytes: 0030b50c6763408773df844513ca4716aa6b693bfd61aa4700898b6661e0d03689ff4af77857c406f3da886e9b4ec9fdda44
2026-02-02T15:35:25.154656 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 50 bytes successfully. Data preview (hex): 0030b50c6763408773df844513ca4716aa6b693b...
2026-02-02T15:35:25.154656 [FINE] [YamuxStream] [3][Client] StreamID=1 Direct write: Successfully wrote all 20 bytes in 2ms
2026-02-02T15:35:25.154656 [FINEST] [YamuxStream] [3][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:25.154656 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:25.155658 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.155658 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.155658 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.155658 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:25.155999 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:25.155999 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:25.155999 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:25.155999 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:25.155999 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(8b36fc55) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:25.156505 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(8b36fc55) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:25.156505 [FINEST] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cf909f7a6baffb2840ac7dd07a665bffd113b0f05b9fb15493fb10b8c
2026-02-02T15:35:25.156505 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:25.156505 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.156505 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.156505 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.156505 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:25.156505 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:25.156505 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:25.156505 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:25.156505 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:25.156505 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(2eeeba52) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:25.156505 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(2eeeba52) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: f909f7a6baffb2840ac7dd07a665bffd113b0f05b9fb15493fb10b8c
2026-02-02T15:35:25.156505 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:25.156505 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:25.156505 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:25.158019 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:25.158019 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:25.158019 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:25.158019 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:25.158019 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(7cc797ef) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:25.158019 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(7cc797ef) END (from buffer). Returning 28 bytes: f909f7a6baffb2840ac7dd07a665bffd113b0f05b9fb15493fb10b8c. Buffer after: 0 bytes: 
2026-02-02T15:35:25.158019 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [249, 9, 247, 166]
2026-02-02T15:35:25.158019 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:25.158019 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: f909f7a6baffb2840ac7dd07a665bffd113b0f05b9fb15493fb10b8c
2026-02-02T15:35:25.159058 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:25.159058 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:25.159058 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: f909f7a6baffb2840ac7dd07
2026-02-02T15:35:25.159058 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: a665bffd113b0f05b9fb15493fb10b8c
2026-02-02T15:35:25.159058 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [249, 9, 247, 166]
2026-02-02T15:35:25.159058 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [166, 101, 191, 253]
2026-02-02T15:35:25.159058 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [166, 101, 191, 253, 17, 59, 15, 5, 185, 251, 21, 73, 63, 177, 11, 140]
2026-02-02T15:35:25.159058 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:25.159058 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059142886): [209, 30, 6, 24, 115, 111, 198, 202, 208, 48, 32, 79, 121, 176, 89, 189, 242, 186, 22, 223, 6, 191, 117, 175, 52, 11, 80, 60, 49, 187, 119, 146]
2026-02-02T15:35:25.160057 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:35:25.160057 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:25.160057 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:35:25.160057 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:25.160057 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.160057 [FINER] [YamuxStream] [3][Client] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262124, New: 524268
2026-02-02T15:35:25.160057 [FINEST] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c417261d5a9b42b583148d6d0e929d9bf6fdfb07771b6babd7c883c47
2026-02-02T15:35:25.161057 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(8b36fc55) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:25.161057 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(8b36fc55) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 417261d5a9b42b583148d6d0e929d9bf6fdfb07771b6babd7c883c47
2026-02-02T15:35:25.161057 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:25.161057 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:25.161057 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:25.161057 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:25.161057 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:25.161057 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:25.161057 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:25.161057 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(d2fb562f) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:25.161057 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(d2fb562f) END (from buffer). Returning 28 bytes: 417261d5a9b42b583148d6d0e929d9bf6fdfb07771b6babd7c883c47. Buffer after: 0 bytes: 
2026-02-02T15:35:25.161057 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [65, 114, 97, 213]
2026-02-02T15:35:25.162056 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:25.162056 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 417261d5a9b42b583148d6d0e929d9bf6fdfb07771b6babd7c883c47
2026-02-02T15:35:25.162056 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:25.162056 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:25.162056 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 417261d5a9b42b583148d6d0
2026-02-02T15:35:25.162056 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: e929d9bf6fdfb07771b6babd7c883c47
2026-02-02T15:35:25.162056 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [65, 114, 97, 213]
2026-02-02T15:35:25.162056 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [233, 41, 217, 191]
2026-02-02T15:35:25.162056 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [233, 41, 217, 191, 111, 223, 176, 119, 113, 182, 186, 189, 124, 136, 60, 71]
2026-02-02T15:35:25.162056 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:25.163057 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057500832): [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
2026-02-02T15:35:25.163057 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:35:25.163057 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:25.163057 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:35:25.163057 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:25.163057 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.163057 [FINER] [YamuxStream] [2][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:35:25.163057 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:25.164056 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.164056 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.164056 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.164056 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:25.164056 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:25.164056 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:25.164056 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:25.165055 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:25.165055 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(1846a903) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:25.165055 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(1846a903) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:25.165055 [FINEST] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030b50c6763408773df844513ca4716aa6b693bfd61aa4700898b6661e0d03689ff4af77857c406f3da886e9b4ec9fdda44
2026-02-02T15:35:25.165055 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:25.165055 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.166056 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.166056 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.166056 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:25.166056 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:25.166056 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:25.166056 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:25.166056 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:25.166056 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(415560cb) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:35:25.167056 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(415560cb) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: b50c6763408773df844513ca4716aa6b693bfd61aa4700898b6661e0d03689ff4af77857c406f3da886e9b4ec9fdda44
2026-02-02T15:35:25.167056 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:25.167056 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:25.167056 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:25.168054 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:25.168054 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:25.168054 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:25.168560 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:25.168560 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(fd4bb377) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:25.168560 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(fd4bb377) END (from buffer). Returning 48 bytes: b50c6763408773df844513ca4716aa6b693bfd61aa4700898b6661e0d03689ff4af77857c406f3da886e9b4ec9fdda44. Buffer after: 0 bytes: 
2026-02-02T15:35:25.168560 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [181, 12, 103, 99]
2026-02-02T15:35:25.168560 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:25.168560 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: b50c6763408773df844513ca4716aa6b693bfd61aa4700898b6661e0d03689ff4af77857c406f3da886e9b4ec9fdda44
2026-02-02T15:35:25.168560 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:25.168560 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:25.168560 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: b50c6763408773df844513ca4716aa6b693bfd61aa4700898b6661e0d03689ff
2026-02-02T15:35:25.168560 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 4af77857c406f3da886e9b4ec9fdda44
2026-02-02T15:35:25.168560 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [181, 12, 103, 99]
2026-02-02T15:35:25.168560 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [74, 247, 120, 87]
2026-02-02T15:35:25.169563 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [74, 247, 120, 87, 196, 6, 243, 218, 136, 110, 155, 78, 201, 253, 218, 68]
2026-02-02T15:35:25.169563 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:25.169563 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057500832): [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
2026-02-02T15:35:25.170563 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:35:25.170563 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:25.170563 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:35:25.170563 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:25.170563 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.170563 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:25.170563 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.170563 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.170563 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.170563 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:25.172067 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:25.172067 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:25.172067 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:25.172067 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.172067 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:25.172067 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:25.172067 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:25.172067 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:25.172067 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:25.173084 [FINE] [YamuxStream] [2][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:35:25.173084 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:25.173084 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:35:25.173084 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:25.173084 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:25.173084 [FINER] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Writing 50 bytes: 003025cd4be58340a69842165a5e3346eb9f6457c3a6c2e6d01c1097f48b5c873744e18b25eff8a50d13aaaf2e77b4fcc1f0
2026-02-02T15:35:25.174085 [FINEST] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Flushed 50 bytes successfully. Data preview (hex): 003025cd4be58340a69842165a5e3346eb9f6457...
2026-02-02T15:35:25.174085 [FINE] [YamuxStream] [2][Server] StreamID=1 Direct write: Successfully wrote all 20 bytes in 1ms
2026-02-02T15:35:25.174085 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:25.174085 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:25.175084 [FINEST] [YamuxStream] [2][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:25.175084 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:25.176084 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.176084 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.176084 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.176084 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:25.176084 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:25.176084 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:25.176084 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:25.176084 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:25.176084 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(597d0b30) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:25.176084 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(597d0b30) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:25.176084 [FINEST] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 003025cd4be58340a69842165a5e3346eb9f6457c3a6c2e6d01c1097f48b5c873744e18b25eff8a50d13aaaf2e77b4fcc1f0
2026-02-02T15:35:25.177084 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(1846a903) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:25.177084 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(1846a903) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 25cd4be58340a69842165a5e3346eb9f6457c3a6c2e6d01c1097f48b5c873744e18b25eff8a50d13aaaf2e77b4fcc1f0
2026-02-02T15:35:25.177084 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:25.177084 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:25.177084 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:25.177084 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:25.177084 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:25.177084 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:25.177084 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:25.177084 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(f9cbdcfe) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:25.177084 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(f9cbdcfe) END (from buffer). Returning 48 bytes: 25cd4be58340a69842165a5e3346eb9f6457c3a6c2e6d01c1097f48b5c873744e18b25eff8a50d13aaaf2e77b4fcc1f0. Buffer after: 0 bytes: 
2026-02-02T15:35:25.177084 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [37, 205, 75, 229]
2026-02-02T15:35:25.178588 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:25.178588 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 25cd4be58340a69842165a5e3346eb9f6457c3a6c2e6d01c1097f48b5c873744e18b25eff8a50d13aaaf2e77b4fcc1f0
2026-02-02T15:35:25.178588 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:25.178588 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:25.178588 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 25cd4be58340a69842165a5e3346eb9f6457c3a6c2e6d01c1097f48b5c873744
2026-02-02T15:35:25.178588 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: e18b25eff8a50d13aaaf2e77b4fcc1f0
2026-02-02T15:35:25.178588 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [37, 205, 75, 229]
2026-02-02T15:35:25.178588 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [225, 139, 37, 239]
2026-02-02T15:35:25.178588 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [225, 139, 37, 239, 248, 165, 13, 19, 170, 175, 46, 119, 180, 252, 193, 240]
2026-02-02T15:35:25.178588 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:25.179624 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059142886): [209, 30, 6, 24, 115, 111, 198, 202, 208, 48, 32, 79, 121, 176, 89, 189, 242, 186, 22, 223, 6, 191, 117, 175, 52, 11, 80, 60, 49, 187, 119, 146]
2026-02-02T15:35:25.179624 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:35:25.179624 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:25.180625 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:35:25.180625 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:25.180625 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.181622 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:25.181622 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.181622 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.181622 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.181622 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:25.181622 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:25.181622 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:25.181622 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:25.181622 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.182623 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:25.182623 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:25.182623 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:25.182623 [FINE] [YamuxStream] [3][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:35:25.182623 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:35:25.182623 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:35:25.183622 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:35:25.183622 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:35:25.183622 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 46 bytes: 002ce68cdc7a58b9e6cef5788c7675bfc466ee21fc6c11bcf41b02ced393c0a58b1d90eab6781f9d4d135b37c52c
2026-02-02T15:35:25.183622 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 46 bytes successfully. Data preview (hex): 002ce68cdc7a58b9e6cef5788c7675bfc466ee21...
2026-02-02T15:35:25.183622 [FINE] [YamuxStream] [3][Client] StreamID=1 Direct write: Successfully wrote all 16 bytes in 0ms
2026-02-02T15:35:25.184624 [FINEST] [YamuxStream] [3][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:25.184624 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:25.184624 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.184624 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.184624 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.184624 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:25.184624 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:25.184624 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:25.184624 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:25.184624 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:25.184624 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(df04d69e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:25.184624 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(df04d69e) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:25.185622 [FINEST] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002ce68cdc7a58b9e6cef5788c7675bfc466ee21fc6c11bcf41b02ced393c0a58b1d90eab6781f9d4d135b37c52c
2026-02-02T15:35:25.186621 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(597d0b30) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:25.186621 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(597d0b30) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: e68cdc7a58b9e6cef5788c7675bfc466ee21fc6c11bcf41b02ced393c0a58b1d90eab6781f9d4d135b37c52c
2026-02-02T15:35:25.186621 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:35:25.186621 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:25.186621 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:35:25.186621 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:35:25.186621 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:35:25.187621 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:35:25.187621 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:35:25.187621 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(4ef45c33) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:35:25.187621 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(4ef45c33) END (from buffer). Returning 44 bytes: e68cdc7a58b9e6cef5788c7675bfc466ee21fc6c11bcf41b02ced393c0a58b1d90eab6781f9d4d135b37c52c. Buffer after: 0 bytes: 
2026-02-02T15:35:25.187621 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [230, 140, 220, 122]
2026-02-02T15:35:25.187621 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:35:25.188621 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: e68cdc7a58b9e6cef5788c7675bfc466ee21fc6c11bcf41b02ced393c0a58b1d90eab6781f9d4d135b37c52c
2026-02-02T15:35:25.188621 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:35:25.188621 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:35:25.188621 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: e68cdc7a58b9e6cef5788c7675bfc466ee21fc6c11bcf41b02ced393
2026-02-02T15:35:25.188621 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: c0a58b1d90eab6781f9d4d135b37c52c
2026-02-02T15:35:25.188621 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [230, 140, 220, 122]
2026-02-02T15:35:25.189127 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [192, 165, 139, 29]
2026-02-02T15:35:25.189127 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [192, 165, 139, 29, 144, 234, 182, 120, 31, 157, 77, 19, 91, 55, 197, 44]
2026-02-02T15:35:25.189127 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:25.189127 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057500832): [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
2026-02-02T15:35:25.189127 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:35:25.189127 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:35:25.189127 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:35:25.189127 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:25.190131 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.190131 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:35:25.190131 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.190131 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.190131 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.190131 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:35:25.190131 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:35:25.190131 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:25.190131 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:35:25.190131 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.190131 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:35:25.191131 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:35:25.191131 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:35:25.191131 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/ipfs/id/1.0.0"
2026-02-02T15:35:25.191131 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/ipfs/id/1.0.0"
2026-02-02T15:35:25.191131 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/ipfs/id/1.0.0". Sending acknowledgment: "/ipfs/id/1.0.0".
2026-02-02T15:35:25.191131 [FINE] [YamuxStream] [2][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:35:25.191131 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:35:25.191131 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:35:25.207636 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:35:25.207636 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:35:25.207636 [FINER] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Writing 46 bytes: 002c83b56297ed2cdf92090ca2ddf99f63d18d10184358bdbd890aef89b7f99476df4acfaf3138feb1912e2d0351
2026-02-02T15:35:25.208635 [FINEST] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Flushed 46 bytes successfully. Data preview (hex): 002c83b56297ed2cdf92090ca2ddf99f63d18d10...
2026-02-02T15:35:25.208635 [FINE] [YamuxStream] [2][Server] StreamID=1 Direct write: Successfully wrote all 16 bytes in 17ms
2026-02-02T15:35:25.208635 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/ipfs/id/1.0.0".
2026-02-02T15:35:25.208635 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/ipfs/id/1.0.0" and its handler.
2026-02-02T15:35:25.208635 [FINE] [multistream] [multistreamMuxer - handle] Protocol /ipfs/id/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:25.208635 [FINE] [StreamScopeImpl] stream-1770068125134-6523: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:25.208635 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
2026-02-02T15:35:25.208635 [FINE] [StreamScopeImpl] stream-1770068125134-6523: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:25.208635 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /ipfs/id/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:35:25.209635 [FINE] [identify] IdentifyService.handleIdentifyRequest: SERVER received identify request from 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc (reported as 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc) on stream 1
2026-02-02T15:35:25.209635 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER ENTRY POINT for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. IsPush: false. Stream ID: 1
2026-02-02T15:35:25.209635 [FINE] [identify] IdentifyService.sendIdentifyResp: Preparing to send identify response to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. IsPush: false. Stream ID: 1
2026-02-02T15:35:25.209635 [FINER] [identify] IdentifyService.sendIdentifyResp: Setting service scope for stream to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
2026-02-02T15:35:25.209635 [FINE] [StreamScopeImpl] stream-1770068125134-6523: Setting service to libp2p.identify for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc, protocol /ipfs/id/1.0.0
2026-02-02T15:35:25.210140 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
2026-02-02T15:35:25.210140 [FINE] [StreamScopeImpl] stream-1770068125134-6523: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:35:25.210140 [FINER] [identify] IdentifyService.sendIdentifyResp: Acquiring current snapshot for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
2026-02-02T15:35:25.210140 [FINE] [identify] IdentifyService.sendIdentifyResp: Sending snapshot to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc: seq=4, protocols=7, addrs=2
2026-02-02T15:35:25.210140 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Creating base response for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. Snapshot seq: 4
2026-02-02T15:35:25.210140 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ObservedAddr set to /ip4/127.0.0.1/tcp/58647 for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:25.210140 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: LocalAddr: /ip4/0.0.0.0/tcp/4503, RemoteAddr: /ip4/127.0.0.1/tcp/58647, ViaLoopback: true for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:25.210140 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added 2 listen addresses for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:25.211143 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added public key (36 bytes) for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:25.211143 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ProtocolVersion: ipfs/0.1.0, AgentVersion: dart-libp2p/0.1.0 for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:25.211143 [FINER] [identify] IdentifyService._getSignedRecord: Attempting to get signed record. DisableSignedPeerRecord: false, Snapshot record type: Future<Envelope?>
2026-02-02T15:35:25.211143 [FINER] [identify] IdentifyService._getSignedRecord: Marshalled signed record successfully (181 bytes).
2026-02-02T15:35:25.211143 [FINER] [identify] IdentifyService.sendIdentifyResp: Added signed peer record (181 bytes) to response for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
2026-02-02T15:35:25.211143 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER About to write identify message to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc on stream 1 (remote addr: /ip4/127.0.0.1/tcp/58647)
2026-02-02T15:35:25.212144 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Writing to stream 1 for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. Total message size: 437 bytes. SignedPeerRecord present: true
2026-02-02T15:35:25.213143 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Sending as single delimited message (size 437).
2026-02-02T15:35:25.213143 [FINE] [YamuxStream] [2][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 439 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524252
2026-02-02T15:35:25.228820 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 451, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 183, 181, 3, 10, 36, 8, 1, 18, 32])
2026-02-02T15:35:25.228820 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:35:25.228820 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 467 bytes (plaintext was 451)
2026-02-02T15:35:25.228820 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 469
2026-02-02T15:35:25.230332 [FINER] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Writing 469 bytes: 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
2026-02-02T15:35:25.230332 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:25.230332 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.230332 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.230332 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.230332 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:25.230332 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:25.231388 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:25.231388 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:25.231388 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:25.231388 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(d711dd20) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:25.231388 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(d711dd20) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:25.232387 [FINEST] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002c83b56297ed2cdf92090ca2ddf99f63d18d10184358bdbd890aef89b7f99476df4acfaf3138feb1912e2d0351
2026-02-02T15:35:25.232387 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(df04d69e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:25.232387 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(df04d69e) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: 83b56297ed2cdf92090ca2ddf99f63d18d10184358bdbd890aef89b7f99476df4acfaf3138feb1912e2d0351
2026-02-02T15:35:25.232387 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:35:25.232387 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:25.232387 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:35:25.232387 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:35:25.232387 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:35:25.232387 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:35:25.232387 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:35:25.232387 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(d73acb0e) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:35:25.233386 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(d73acb0e) END (from buffer). Returning 44 bytes: 83b56297ed2cdf92090ca2ddf99f63d18d10184358bdbd890aef89b7f99476df4acfaf3138feb1912e2d0351. Buffer after: 0 bytes: 
2026-02-02T15:35:25.233386 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [131, 181, 98, 151]
2026-02-02T15:35:25.233386 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:35:25.233386 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: 83b56297ed2cdf92090ca2ddf99f63d18d10184358bdbd890aef89b7f99476df4acfaf3138feb1912e2d0351
2026-02-02T15:35:25.233386 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:35:25.233386 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:35:25.233386 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 83b56297ed2cdf92090ca2ddf99f63d18d10184358bdbd890aef89b7
2026-02-02T15:35:25.233386 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: f99476df4acfaf3138feb1912e2d0351
2026-02-02T15:35:25.233386 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [131, 181, 98, 151]
2026-02-02T15:35:25.233386 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [249, 148, 118, 223]
2026-02-02T15:35:25.233386 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [249, 148, 118, 223, 74, 207, 175, 49, 56, 254, 177, 145, 46, 45, 3, 81]
2026-02-02T15:35:25.233386 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:25.234386 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059142886): [209, 30, 6, 24, 115, 111, 198, 202, 208, 48, 32, 79, 121, 176, 89, 189, 242, 186, 22, 223, 6, 191, 117, 175, 52, 11, 80, 60, 49, 187, 119, 146]
2026-02-02T15:35:25.234386 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:35:25.234386 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:35:25.234386 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:35:25.234386 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:25.234386 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.234386 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:35:25.234386 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.234386 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.235385 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.235385 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:35:25.235385 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:35:25.235385 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:25.235385 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:35:25.235385 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.235385 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:35:25.235385 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:35:25.235385 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:35:25.236385 [FINE] [YamuxStream] [3][Client] StreamID=1 setDeadline() set to 2026-02-02T15:35:55.236385
2026-02-02T15:35:25.236385 [FINE] [StreamScopeImpl] stream-1770068125141-6901: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:25.236385 [FINE] [StreamScopeImpl] stream-1770068125141-6901: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:25.237385 [FINE] [identify]  [IDENTIFY-STREAM-READY] peer=12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C, stream_id=1, protocol=/ipfs/id/1.0.0
2026-02-02T15:35:25.237385 [FINE] [StreamScopeImpl] stream-1770068125141-6901: Setting service to libp2p.identify for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C, protocol /ipfs/id/1.0.0
2026-02-02T15:35:25.237385 [FINE] [StreamScopeImpl] stream-1770068125141-6901: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:35:25.237385 [FINEST] [YamuxStream] [3][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:25.238386 [FINEST] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Flushed 469 bytes successfully. Data preview (hex): 01d3216e3e7bc8b12927500dc07ceb169eba061f...
2026-02-02T15:35:25.238386 [FINE] [YamuxStream] [2][Server] StreamID=1 Direct write: Successfully wrote all 439 bytes in 25ms
2026-02-02T15:35:25.238386 [FINE] [identify] IdentifyService._writeChunkedIdentifyMsg: Single message sent to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
2026-02-02T15:35:25.238386 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Identify message written to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
2026-02-02T15:35:25.238386 [FINER] [identify] IdentifyService.sendIdentifyResp: Updating sequence number for connection to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
2026-02-02T15:35:25.238386 [FINER] [identify] IdentifyService.sendIdentifyResp: Updated sequence for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc to 4.
2026-02-02T15:35:25.238386 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Signalling end of writes (calling stream.closeWrite()) on stream to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
2026-02-02T15:35:25.239384 [FINER] [YamuxStream] [2][Server] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:35:25.239384 [FINER] [YamuxStream] [2][Server] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:35:25.239384 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:25.239384 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:35:25.239384 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:25.239384 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:25.239384 [FINER] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Writing 30 bytes: 001ca36efead658c12487c4aefcb93d5f90a87f8c86302c6e593435dac3f
2026-02-02T15:35:25.242895 [FINEST] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Flushed 30 bytes successfully. Data preview (hex): 001ca36efead658c12487c4aefcb93d5f90a87f8...
2026-02-02T15:35:25.242895 [FINE] [YamuxStream] [2][Server] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:35:25.242895 [FINE] [YamuxStream] [2][Server] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:35:25.242895 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER stream.closeWrite() completed for 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. Stream will NOT be fully closed by sendIdentifyResp anymore.
2026-02-02T15:35:25.242895 [FINE] [identify] IdentifyService.sendIdentifyResp: Successfully sent identify response and signalled closeWrite to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc. IsPush: false.
2026-02-02T15:35:25.243895 [FINEST] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - RAW_SOCKET_DATA_CHUNK_RECV (469 bytes): 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
2026-02-02T15:35:25.243895 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:25.243895 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.243895 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.244895 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.244895 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:25.244895 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:25.244895 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:25.244895 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:25.244895 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:25.244895 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(63809f63) START. Requested: 2. Buffer: 469 bytes.
2026-02-02T15:35:25.244895 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(63809f63) END (from buffer). Returning 2 bytes: 01d3. Buffer after: 467 bytes: 216e3e7bc8b12927500dc07ceb169eba061f617e2dacbee4f7c1b142cdca9cbdae7e5122506eff115d692be8a286375f4ebce18ecd8f371fa02938e79c419b6876bd68a6318c54dfe3a5ac4ef9ea492cd7b6c47ca6bf2d90e2f94eb0a0fe61e73218d06bb122eb83e9823f3b6e5f784f3a5e1f7d53c255399dad61c7f0e2fbda3f961a5247e8d5151733b8aa5dfbe2fbf09ff91daf88470c771ea597b48b30dc01afecb9cb040367d71b534d102594171da86ecdab4252a2ad1670f11d53129263a52c99ca6be095ac734d958c0334e9b3eaf416f169da410ebca043e11739f3325a4ae9aaa4fcc00ffd3d9b17b6acece0a798577c46a1912a03979cbc8f79e97f2fb05c00dadd0d5d8053af046aea1327937eabe8e78b733fa05ffbe958cbdd6dce0f1c711fa904d7db4664703a6d699704b95c4b5399d044533f490c2e56af3eca7cf5ca418135e19e57c5f50211789134d0d6164c9a3313636574fb4611b31edcbb641a0ab073ae26aab499b08c21d983e06abd6d02864513a13bb9771a8c13682c9eebe09958d410e105d67226014ed6e48e2540cfc4fb30396364cbd41c8d13de31635017e192e9e9b328c8e38c2c5d098c879459e64c89fae3584d15e930897e2bd8bf2a6f308e4660e3ae47fde84b6b
2026-02-02T15:35:25.245894 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [1, 211]
2026-02-02T15:35:25.245894 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:25.245894 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [1, 211]
2026-02-02T15:35:25.245894 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 01d3
2026-02-02T15:35:25.245894 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 467
2026-02-02T15:35:25.245894 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 467
2026-02-02T15:35:25.245894 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 467 more bytes (have 0/467)
2026-02-02T15:35:25.245894 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(28c8539e) START. Requested: 467. Buffer: 467 bytes.
2026-02-02T15:35:25.246893 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(28c8539e) END (from buffer). Returning 467 bytes: 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. Buffer after: 0 bytes: 
2026-02-02T15:35:25.246893 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 467 bytes. First 4 bytes: [33, 110, 62, 123]
2026-02-02T15:35:25.246893 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 467, Got: 467
2026-02-02T15:35:25.246893 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 467, Bytes: 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
2026-02-02T15:35:25.246893 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 467
2026-02-02T15:35:25.246893 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(451) and MAC(16)
2026-02-02T15:35:25.246893 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 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
2026-02-02T15:35:25.247892 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2bd8bf2a6f308e4660e3ae47fde84b6b
2026-02-02T15:35:25.247892 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [33, 110, 62, 123]
2026-02-02T15:35:25.247892 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [43, 216, 191, 42]
2026-02-02T15:35:25.247892 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [43, 216, 191, 42, 111, 48, 142, 70, 96, 227, 174, 71, 253, 232, 75, 107]
2026-02-02T15:35:25.247892 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:25.247892 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059142886): [209, 30, 6, 24, 115, 111, 198, 202, 208, 48, 32, 79, 121, 176, 89, 189, 242, 186, 22, 223, 6, 191, 117, 175, 52, 11, 80, 60, 49, 187, 119, 146]
2026-02-02T15:35:25.247892 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 451 bytes
2026-02-02T15:35:25.248893 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 451 bytes to _decryptedBuffer. New _decryptedBuffer.length: 451
2026-02-02T15:35:25.248893 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 439. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 183]
2026-02-02T15:35:25.248893 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:25.248893 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.248893 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=439
2026-02-02T15:35:25.248893 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.248893 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.248893 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.248893 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=439
2026-02-02T15:35:25.248893 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 439, _decryptedBuffer.length: 439
2026-02-02T15:35:25.248893 [FINER] [SecuredConnection] SecuredConnection.read (length=439): Returning 439 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [181, 3, 10, 36, 8, 1, 18, 32, 6, 114, 18, 174, 249, 177, 9, 254, 45, 104, 78, 158]
2026-02-02T15:35:25.249892 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=439
2026-02-02T15:35:25.249892 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.249892 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 439, flags: 0
2026-02-02T15:35:25.249892 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 439 bytes directly to waiting reader
2026-02-02T15:35:25.249892 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 475
2026-02-02T15:35:25.249892 [FINE] [identify]  [READ-ALL-ID-MESSAGES] Parsed identify from peer=12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C, 437 bytes, duration=12ms
2026-02-02T15:35:25.249892 [FINE] [identify] IdentifyService._consumeMessage: Consuming identify message from 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C. IsPush: false.
2026-02-02T15:35:25.250892 [FINER] [identify] IdentifyService._consumeMessage: Current known protocols for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C: 0
2026-02-02T15:35:25.250892 [FINER] [identify] IdentifyService._consumeMessage: Received protocols from 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C: 7
2026-02-02T15:35:25.250892 [FINER] [identify] IdentifyService._diff: Calculating protocol diff. Before: 0, After: 7
2026-02-02T15:35:25.251397 [FINER] [identify] IdentifyService._diff: Added: 7, Removed: 0
2026-02-02T15:35:25.251397 [FINE] [identify] IdentifyService._consumeMessage: For peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C - Added protocols: 7, Removed protocols: 0
2026-02-02T15:35:25.251397 [FINE] [identify] IdentifyService._consumeMessage: Parsed observed address for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C: /ip4/127.0.0.1/tcp/58647
2026-02-02T15:35:25.251397 [FINE] [identify] IdentifyService._consumeMessage: Recording observed address /ip4/127.0.0.1/tcp/58647 for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C via conn 1.
2026-02-02T15:35:25.252059 [FINER] [identify] IdentifyService._consumeMessage: Processing 2 listen addresses from 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:25.252059 [FINE] [identify] IdentifyService._consumeMessage: Parsed 2 listen addresses for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:25.252564 [FINER] [identify] IdentifyService._consumeMessage: Attempting to parse signed peer record for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C (181 bytes).
2026-02-02T15:35:25.252564 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Checking for signed peer record.
2026-02-02T15:35:25.252564 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Attempting to consume envelope from 181 bytes.
2026-02-02T15:35:25.268700 [FINE] [identify] IdentifyService.signedPeerRecordFromMessage: Successfully consumed envelope.
2026-02-02T15:35:25.269205 [FINE] [identify] IdentifyService._consumeMessage: Parsed signed peer record for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C: true
2026-02-02T15:35:25.269205 [FINER] [identify] IdentifyService._consumeMessage: Connectedness for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C: Connectedness.connected. Default TTL: 4:00:00.000000
2026-02-02T15:35:25.269205 [FINER] [identify] IdentifyService._consumeMessage: Peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C is connected/limited, using TTL: 875976:00:00.000000
2026-02-02T15:35:25.269205 [FINER] [identify] IdentifyService._consumeMessage: Updating address book for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C. Current TTLs: RecentlyConnectedAddrTTL=4:00:00.000000, ConnectedAddrTTL=875976:00:00.000000, TempAddrTTL=0:02:00.000000.
2026-02-02T15:35:25.270222 [FINER] [identify] IdentifyService._consumeMessage: Consuming signed peer record for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:25.270222 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Consuming signed record for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:25.283815 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Derived PeerId 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C from record public key for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:25.283815 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Obtained record from envelope for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:25.283815 [FINE] [identify] IdentifyService._consumeSignedPeerRecord: Successfully consumed signed peer record for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C. Found 2 addresses.
2026-02-02T15:35:25.284815 [FINE] [identify] IdentifyService._consumeMessage: Addresses from signed peer record for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C: 2
2026-02-02T15:35:25.284815 [FINER] [identify] IdentifyService._consumeMessage: Filtering addresses for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C based on remote connection address /ip4/127.0.0.1/tcp/4503. Before filter: 2
2026-02-02T15:35:25.284815 [FINER] [identify] IdentifyService._filterAddrs: Filtering 2 addresses based on remote address type: /ip4/127.0.0.1/tcp/4503 (Loopback: true, Private: false, Public: false)
2026-02-02T15:35:25.284815 [FINER] [identify] IdentifyService._filterAddrs: Remote is loopback, returning all addresses.
2026-02-02T15:35:25.284815 [FINER] [identify] IdentifyService._consumeMessage: After filter for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C: 2
2026-02-02T15:35:25.284815 [FINE] [identify] IdentifyService._consumeMessage: Adding 2 addresses for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C to peerstore with TTL 875976:00:00.000000.
2026-02-02T15:35:25.285815 [FINER] [identify] IdentifyService._consumeMessage: Updating TempAddrTTL to zero for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:25.285815 [FINE] [identify] IdentifyService._consumeMessage: Storing metadata for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C: ProtocolVersion=ipfs/0.1.0, AgentVersion=dart-libp2p/0.1.0
2026-02-02T15:35:25.285815 [FINER] [identify] IdentifyService._consumeMessage: Consuming received public key for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:25.285815 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Consuming public key for remote peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C from local peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc.
2026-02-02T15:35:25.285815 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Received 36 bytes for public key of 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:25.285815 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Successfully unmarshalled public key for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:25.286815 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C from received public key for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:25.286815 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C matches expected remote peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:25.286815 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Existing public key found for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C. Comparing with received key.
2026-02-02T15:35:25.287816 [FINE] [identify] IdentifyService._consumeReceivedPubKey: Received public key for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C matches existing key in peerstore.
2026-02-02T15:35:25.288814 [FINE] [identify] IdentifyService._consumeMessage: Finished consuming message from 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:25.288814 [FINER] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Checking push support for 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C in peerstore.
2026-02-02T15:35:25.288814 [FINE] [autonatv2] Peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C identification completed, updating peer map
2026-02-02T15:35:25.290813 [FINE] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C supports push.
2026-02-02T15:35:25.290813 [FINER] [YamuxStream] [3][Client] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:35:25.290813 [FINER] [YamuxStream] [3][Client] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:35:25.291814 [FINE] [autonatv2] Updating peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C: protocols=[/ipfs/id/1.0.0, /ipfs/id/push/1.0.0, /ipfs/ping/1.0.0, /libp2p/autonat/2/dial-back, /libp2p/autonat/2/dial-request, /libp2p/dcutr, /test/broadcast/1.0.0], connectedness=Connectedness.connected
2026-02-02T15:35:25.291814 [FINE] [autonatv2] Adding peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C to AutoNAT v2 peer map (supports /libp2p/autonat/2/dial-request)
2026-02-02T15:35:25.291814 [FINE] [ambient_autonat_v2] Peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C supports AutoNAT v2, scheduling probe
2026-02-02T15:35:25.291814 [FINE] [ambient_autonat_v2] Scheduling probe in 2s (force: true, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:25.292319 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:25.292319 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:35:25.292319 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:25.292319 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:25.292319 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 30 bytes: 001cee72e4b3d6fe586cc29087985da6dd3f19dce8296cf3a65e5f930190
2026-02-02T15:35:25.293323 [FINEST] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001ca36efead658c12487c4aefcb93d5f90a87f8c86302c6e593435dac3f
2026-02-02T15:35:25.296322 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:25.296322 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.297322 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.297322 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.297322 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:25.297322 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:25.297322 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:25.297322 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:25.297322 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:25.297322 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(90884c3e) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:25.297322 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(90884c3e) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: a36efead658c12487c4aefcb93d5f90a87f8c86302c6e593435dac3f
2026-02-02T15:35:25.297322 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:25.297322 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:25.297322 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:25.297322 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:25.297322 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:25.298322 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:25.298322 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:25.298322 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(61dd4e20) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:25.298322 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(61dd4e20) END (from buffer). Returning 28 bytes: a36efead658c12487c4aefcb93d5f90a87f8c86302c6e593435dac3f. Buffer after: 0 bytes: 
2026-02-02T15:35:25.298322 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [163, 110, 254, 173]
2026-02-02T15:35:25.298322 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:25.298322 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: a36efead658c12487c4aefcb93d5f90a87f8c86302c6e593435dac3f
2026-02-02T15:35:25.298322 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:25.298322 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:25.298322 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: a36efead658c12487c4aefcb
2026-02-02T15:35:25.298322 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 93d5f90a87f8c86302c6e593435dac3f
2026-02-02T15:35:25.298322 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [163, 110, 254, 173]
2026-02-02T15:35:25.298322 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [147, 213, 249, 10]
2026-02-02T15:35:25.298322 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [147, 213, 249, 10, 135, 248, 200, 99, 2, 198, 229, 147, 67, 93, 172, 63]
2026-02-02T15:35:25.298322 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:25.299321 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059142886): [209, 30, 6, 24, 115, 111, 198, 202, 208, 48, 32, 79, 121, 176, 89, 189, 242, 186, 22, 223, 6, 191, 117, 175, 52, 11, 80, 60, 49, 187, 119, 146]
2026-02-02T15:35:25.299321 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:35:25.299321 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:25.299321 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:25.299321 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:25.299321 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.299321 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:25.299321 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:35:25.300322 [FINE] [YamuxStream] [3][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=false, queueSize=0
2026-02-02T15:35:25.304844 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:25.304844 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.304844 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.304844 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.304844 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:25.304844 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:25.305843 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:25.305843 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:25.305843 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:25.305843 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(b97be759) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:25.305843 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(b97be759) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:25.306843 [FINEST] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cee72e4b3d6fe586cc29087985da6dd3f19dce8296cf3a65e5f930190
2026-02-02T15:35:25.306843 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(d711dd20) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:25.306843 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(d711dd20) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: ee72e4b3d6fe586cc29087985da6dd3f19dce8296cf3a65e5f930190
2026-02-02T15:35:25.306843 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:25.306843 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:25.306843 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:25.306843 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:25.306843 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:25.306843 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:25.306843 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:25.306843 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(91d42da3) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:25.306843 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(91d42da3) END (from buffer). Returning 28 bytes: ee72e4b3d6fe586cc29087985da6dd3f19dce8296cf3a65e5f930190. Buffer after: 0 bytes: 
2026-02-02T15:35:25.307843 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [238, 114, 228, 179]
2026-02-02T15:35:25.307843 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:25.307843 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: ee72e4b3d6fe586cc29087985da6dd3f19dce8296cf3a65e5f930190
2026-02-02T15:35:25.307843 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:25.307843 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:25.307843 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: ee72e4b3d6fe586cc2908798
2026-02-02T15:35:25.307843 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 5da6dd3f19dce8296cf3a65e5f930190
2026-02-02T15:35:25.307843 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [238, 114, 228, 179]
2026-02-02T15:35:25.308842 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [93, 166, 221, 63]
2026-02-02T15:35:25.308842 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [93, 166, 221, 63, 25, 220, 232, 41, 108, 243, 166, 94, 95, 147, 1, 144]
2026-02-02T15:35:25.308842 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:25.308842 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057500832): [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
2026-02-02T15:35:25.308842 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 12 bytes
2026-02-02T15:35:25.308842 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:25.308842 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:25.308842 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:25.308842 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:25.339615 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:25.339615 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:35:25.339615 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:35:25.340632 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 30 bytes successfully. Data preview (hex): 001cee72e4b3d6fe586cc29087985da6dd3f19dc...
2026-02-02T15:35:25.340632 [FINE] [YamuxStream] [3][Client] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.closing.
2026-02-02T15:35:25.340632 [FINE] [YamuxStream] [3][Client] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.closing.
2026-02-02T15:35:25.340632 [FINE] [identify]  [SPAWN-IDENTIFY-SUCCESS] Identify succeeded for peer=12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C, duration=216ms
2026-02-02T15:35:25.340632 [FINE] [Libp2pRouter] [DEBUG] Connected to peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:25.341629 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:25.341629 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:25.342630 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:25.342630 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:25.342630 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:25.342630 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:25.342630 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:25.342630 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:25.342630 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:25.342630 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(289ff488) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:25.342630 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(289ff488) ASYNC WAIT. Requested: 2. Buffer: 0
00:56 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:25.633387 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:35:25.633387 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:25.633387 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:25.633387 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:25.633387 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:25.633387 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:25.633387 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:25.633387 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:25.633387 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:25.633387 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:25.634387 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:35:25.634387 [INFO] [Config] [Config.newNode] for peer 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom: Host created. Listening will be handled by host.start().
2026-02-02T15:35:25.634387 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:25.634387 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom, network.hashCode: 142817735, initial network.listenAddresses: []
2026-02-02T15:35:25.634387 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:25.634387 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4101]. Attempting to listen via _network.listen().
2026-02-02T15:35:25.634387 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:25.634387 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4101] for peer 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:25.634387 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4101]
2026-02-02T15:35:25.635387 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4101 for peer 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:25.635387 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4101 with transport TCPTransport for peer 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:25.635387 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4101 with transport TCPTransport
00:56 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.215892 [FINE] [ambient_autonat_v2] Probe generation 2 cancelled (current: 3)
2026-02-02T15:35:26.357793 [FINE] [Libp2pRouter] [VERBOSE] Sending message to 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah via protocol /test/broadcast/1.0.0
2026-02-02T15:35:26.358803 [WARNING] [basichost] 🎯 [newStream] ENTERED for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah, protocols: [/test/broadcast/1.0.0]
2026-02-02T15:35:26.358803 [WARNING] [basichost] 🎯 [newStream Phase 1] Connecting to peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah...
2026-02-02T15:35:26.360268 [WARNING] [basichost] ✅ [newStream Phase 1] Connected to peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:26.360268 [WARNING] [basichost] 🎯 [newStream Phase 2] Creating stream to peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah...
2026-02-02T15:35:26.360268 [WARNING] [Swarm] Swarm.newStream: Entered for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah. Context HashCode: 323262642
2026-02-02T15:35:26.360268 [WARNING] [Swarm] Swarm.newStream: Swarm is open for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah.
2026-02-02T15:35:26.360268 [WARNING] [Swarm] Swarm.newStream: Calling dialPeer(context, 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah).
2026-02-02T15:35:26.361772 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah, existing_conns=2
2026-02-02T15:35:26.361772 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah"
2026-02-02T15:35:26.361772 [FINE] [Swarm] Found 1 existing connections for peer ID string: "12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah"
2026-02-02T15:35:26.361772 [FINE] [Swarm] Swarm.dialPeer: Found 1 existing connection(s) for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah. Validating health...
2026-02-02T15:35:26.363287 [WARNING] [Swarm] Swarm.dialPeer: Found healthy connection for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah. Returning newest connection ID: 0
2026-02-02T15:35:26.363287 [WARNING] [Swarm] Swarm.newStream: Successfully dialed peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah. Conn runtimeType: SwarmConn, Conn ID: 0, Conn local: 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc, Conn remote: 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:26.363287 [WARNING] [Swarm] Swarm.newStream: About to call (conn as SwarmConn).newStream() for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah on SwarmConn 0.
2026-02-02T15:35:26.363287 [FINE] [SwarmConn] SwarmConn.newStream (0): Entered to peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah. Context HashCode: 323262642
2026-02-02T15:35:26.363287 [FINE] [SwarmConn] SwarmConn.newStream (0): Connection is open.
2026-02-02T15:35:26.363287 [FINE] [SwarmConn] SwarmConn.newStream (0): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:35:26.364308 [FINE] [SwarmConn] SwarmConn.newStream (0): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:35:26.364308 [FINE] [YamuxStream] [1][Client] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:26.364812 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:35:26.364812 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:35:26.364812 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:26.364812 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:26.364812 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 30 bytes: 001ca5a266387a1ad10caaa5e44b7883c7124c84a5ee4fa9892adf8d38cc
2026-02-02T15:35:26.364812 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001ca5a266387a1ad10caaa5e44b7883c7124c84a5ee4fa9892adf8d38cc
2026-02-02T15:35:26.364812 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(ff5bb8bd) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:26.364812 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(ff5bb8bd) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: a5a266387a1ad10caaa5e44b7883c7124c84a5ee4fa9892adf8d38cc
2026-02-02T15:35:26.366072 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:26.366072 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.366072 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:26.366072 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:26.366072 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:26.366072 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:26.366072 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:26.366072 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(55a20766) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:26.366072 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(55a20766) END (from buffer). Returning 28 bytes: a5a266387a1ad10caaa5e44b7883c7124c84a5ee4fa9892adf8d38cc. Buffer after: 0 bytes: 
2026-02-02T15:35:26.366072 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [165, 162, 102, 56]
2026-02-02T15:35:26.366072 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:26.366072 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: a5a266387a1ad10caaa5e44b7883c7124c84a5ee4fa9892adf8d38cc
2026-02-02T15:35:26.366072 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:26.366072 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:26.366072 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: a5a266387a1ad10caaa5e44b
2026-02-02T15:35:26.366072 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 7883c7124c84a5ee4fa9892adf8d38cc
2026-02-02T15:35:26.366072 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [165, 162, 102, 56]
2026-02-02T15:35:26.366072 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [120, 131, 199, 18]
2026-02-02T15:35:26.366072 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [120, 131, 199, 18, 76, 132, 165, 238, 79, 169, 137, 42, 223, 141, 56, 204]
2026-02-02T15:35:26.366072 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.367575 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064635575): [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
2026-02-02T15:35:26.367575 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:35:26.367575 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:26.367575 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:35:26.367575 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.367575 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.368598 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:35:26.368598 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:35:26.368598 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:26.368598 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:26.368598 [FINER] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Writing 30 bytes: 001c0fe4e98f56008720bfac19b5bb7acf3be07f5a29310d5a7a1ce3fe60
2026-02-02T15:35:26.368598 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 30 bytes successfully. Data preview (hex): 001ca5a266387a1ad10caaa5e44b7883c7124c84...
2026-02-02T15:35:26.369613 [FINEST] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c0fe4e98f56008720bfac19b5bb7acf3be07f5a29310d5a7a1ce3fe60
2026-02-02T15:35:26.369613 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(10e9e065) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:26.369613 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(10e9e065) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 0fe4e98f56008720bfac19b5bb7acf3be07f5a29310d5a7a1ce3fe60
2026-02-02T15:35:26.369613 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:26.369613 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.369613 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:26.369613 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:26.369613 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:26.369613 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:26.369613 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:26.369613 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(368d2d78) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:26.369613 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(368d2d78) END (from buffer). Returning 28 bytes: 0fe4e98f56008720bfac19b5bb7acf3be07f5a29310d5a7a1ce3fe60. Buffer after: 0 bytes: 
2026-02-02T15:35:26.369613 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [15, 228, 233, 143]
2026-02-02T15:35:26.369613 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:26.369613 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 0fe4e98f56008720bfac19b5bb7acf3be07f5a29310d5a7a1ce3fe60
2026-02-02T15:35:26.369613 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:26.369613 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:26.369613 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 0fe4e98f56008720bfac19b5
2026-02-02T15:35:26.369613 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: bb7acf3be07f5a29310d5a7a1ce3fe60
2026-02-02T15:35:26.369613 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [15, 228, 233, 143]
2026-02-02T15:35:26.369613 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [187, 122, 207, 59]
2026-02-02T15:35:26.369613 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [187, 122, 207, 59, 224, 127, 90, 41, 49, 13, 90, 122, 28, 227, 254, 96]
2026-02-02T15:35:26.369613 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.369613 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059730016): [10, 32, 200, 192, 148, 10, 84, 24, 166, 217, 78, 62, 33, 82, 238, 247, 120, 174, 240, 98, 43, 63, 125, 98, 100, 221, 181, 185, 93, 226, 221, 227]
2026-02-02T15:35:26.370639 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:35:26.370639 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:26.370639 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:35:26.370639 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.370639 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.370639 [FINER] [YamuxStream] [1][Client] StreamID=3 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:35:26.370639 [FINER] [YamuxStream] [1][Client] StreamID=3 open() called. Current state: YamuxStreamState.init
2026-02-02T15:35:26.370639 [FINE] [YamuxStream] [1][Client] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:26.370639 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
2026-02-02T15:35:26.370639 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:35:26.370639 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:26.372145 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:26.372145 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 30 bytes: 001cfe56af2f71963438c1fb494ea87de05e0f4dbc2f011587e2b6a063d4
2026-02-02T15:35:26.372663 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 30 bytes successfully. Data preview (hex): 001cfe56af2f71963438c1fb494ea87de05e0f4d...
2026-02-02T15:35:26.372663 [FINE] [SwarmConn] SwarmConn.newStream (0): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 3
2026-02-02T15:35:26.372663 [FINE] [SwarmConn] SwarmConn.newStream (0): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 3.
2026-02-02T15:35:26.372663 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068126372-5985 for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:26.372663 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:35:26.372663 [WARNING] [Swarm] Swarm.newStream: Successfully called (conn as SwarmConn).newStream() for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah. Returned Stream ID: 3, Stream protocol: Closure: () => String from Function 'protocol':.
2026-02-02T15:35:26.372663 [WARNING] [basichost] ✅ [newStream Phase 2] Stream 3 created to peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:26.372663 [WARNING] [basichost] 🎯 [newStream Phase 3] Waiting for identify on stream 3...
2026-02-02T15:35:26.372663 [FINE] [identify]  [IDENTIFY-WAIT-ALREADY-SUCCEEDED] Peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah already identified on this connection, skipping
2026-02-02T15:35:26.373709 [WARNING] [identify]  [IDENTIFY-WAIT-NO-COMPLETER] No completer to await for peer=12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah (e.g., connection was closed). Identify will not complete.
2026-02-02T15:35:26.373709 [WARNING] [basichost] ✅ [newStream Phase 3] Identify complete for stream 3
2026-02-02T15:35:26.373709 [FINE] [YamuxStream] [1][Client] StreamID=3 setDeadline() set to 2026-02-02T15:35:36.373709
2026-02-02T15:35:26.373709 [WARNING] [basichost] 🎯 [newStream Phase 4] Negotiating protocols [/test/broadcast/1.0.0] on stream 3...
2026-02-02T15:35:26.373709 [FINE] [YamuxStream] [1][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:35:26.373709 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:26.373709 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
2026-02-02T15:35:26.373709 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:26.373709 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:26.373709 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 50 bytes: 003006c9f0fd6eca773db849220eded4e541a7e3d1c8001e0b06a77abd34838ff844699f364e38fd723abf76698fae75dc35
2026-02-02T15:35:26.373709 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 50 bytes successfully. Data preview (hex): 003006c9f0fd6eca773db849220eded4e541a7e3...
2026-02-02T15:35:26.373709 [FINE] [YamuxStream] [1][Client] StreamID=3 Direct write: Successfully wrote all 20 bytes in 0ms
2026-02-02T15:35:26.373709 [FINEST] [YamuxStream] [1][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:26.373709 [FINEST] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Flushed 30 bytes successfully. Data preview (hex): 001c0fe4e98f56008720bfac19b5bb7acf3be07f...
2026-02-02T15:35:26.373709 [FINE] [YamuxStream] [0][Server] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:26.375216 [FINER] [YamuxStream] [0][Server] StreamID=3 open() called. Current state: YamuxStreamState.init
2026-02-02T15:35:26.375216 [FINE] [YamuxStream] [0][Server] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:26.375216 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
2026-02-02T15:35:26.375216 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
2026-02-02T15:35:26.375216 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:26.375216 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:26.375216 [FINER] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Writing 30 bytes: 001cb259f75e5d3eda904b16c6673dbe43f3c8f8ff624881f1c78b437ae3
2026-02-02T15:35:26.375734 [FINEST] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Flushed 30 bytes successfully. Data preview (hex): 001cb259f75e5d3eda904b16c6673dbe43f3c8f8...
2026-02-02T15:35:26.375734 [FINER] [YamuxStream] [0][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:35:26.375734 [FINE] [Swarm] Accepted inbound stream 3 from 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc on conn 0
2026-02-02T15:35:26.375734 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068126375-6523 for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:26.376249 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:26.376249 [FINEST] [YamuxStream] [0][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:26.376249 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.376249 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.376249 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.376249 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.376249 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.376249 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.376249 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.376249 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.376249 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.376249 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(0925ae40) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:26.376249 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(0925ae40) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:26.376249 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cfe56af2f71963438c1fb494ea87de05e0f4dbc2f011587e2b6a063d4
2026-02-02T15:35:26.376249 [FINEST] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cb259f75e5d3eda904b16c6673dbe43f3c8f8ff624881f1c78b437ae3
2026-02-02T15:35:26.376249 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(0925ae40) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:26.376249 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(0925ae40) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: b259f75e5d3eda904b16c6673dbe43f3c8f8ff624881f1c78b437ae3
2026-02-02T15:35:26.376249 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:26.376249 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.376249 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:26.376249 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:26.376249 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:26.376249 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:26.376249 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:26.376249 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(cb9a16e0) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:26.376249 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(cb9a16e0) END (from buffer). Returning 28 bytes: b259f75e5d3eda904b16c6673dbe43f3c8f8ff624881f1c78b437ae3. Buffer after: 0 bytes: 
2026-02-02T15:35:26.376249 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [178, 89, 247, 94]
2026-02-02T15:35:26.376249 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:26.376249 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: b259f75e5d3eda904b16c6673dbe43f3c8f8ff624881f1c78b437ae3
2026-02-02T15:35:26.377764 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:26.377764 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:26.377764 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: b259f75e5d3eda904b16c667
2026-02-02T15:35:26.377764 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 3dbe43f3c8f8ff624881f1c78b437ae3
2026-02-02T15:35:26.377764 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [178, 89, 247, 94]
2026-02-02T15:35:26.377764 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [61, 190, 67, 243]
2026-02-02T15:35:26.377764 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [61, 190, 67, 243, 200, 248, 255, 98, 72, 129, 241, 199, 139, 67, 122, 227]
2026-02-02T15:35:26.377764 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.377764 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059730016): [10, 32, 200, 192, 148, 10, 84, 24, 166, 217, 78, 62, 33, 82, 238, 247, 120, 174, 240, 98, 43, 63, 125, 98, 100, 221, 181, 185, 93, 226, 221, 227]
2026-02-02T15:35:26.377764 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 12 bytes
2026-02-02T15:35:26.377764 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:26.377764 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:35:26.377764 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.377764 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.377764 [FINER] [YamuxStream] [1][Client] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262124, New: 524268
2026-02-02T15:35:26.378768 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.378768 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.378768 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.378768 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.378768 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.378768 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.378768 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.378768 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.378768 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.379273 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(3dfe98e7) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:26.379273 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(3dfe98e7) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: fe56af2f71963438c1fb494ea87de05e0f4dbc2f011587e2b6a063d4
2026-02-02T15:35:26.379273 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:26.379273 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.379273 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:26.379273 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:26.379273 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:26.379273 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:26.379273 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:26.380288 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(d18ed739) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:26.380288 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(d18ed739) END (from buffer). Returning 28 bytes: fe56af2f71963438c1fb494ea87de05e0f4dbc2f011587e2b6a063d4. Buffer after: 0 bytes: 
2026-02-02T15:35:26.380288 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [254, 86, 175, 47]
2026-02-02T15:35:26.380288 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:26.380288 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: fe56af2f71963438c1fb494ea87de05e0f4dbc2f011587e2b6a063d4
2026-02-02T15:35:26.380288 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:26.380288 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:26.380288 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: fe56af2f71963438c1fb494e
2026-02-02T15:35:26.380866 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: a87de05e0f4dbc2f011587e2b6a063d4
2026-02-02T15:35:26.380866 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [254, 86, 175, 47]
2026-02-02T15:35:26.380866 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [168, 125, 224, 94]
2026-02-02T15:35:26.380866 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [168, 125, 224, 94, 15, 77, 188, 47, 1, 21, 135, 226, 182, 160, 99, 212]
2026-02-02T15:35:26.380866 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.380866 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064635575): [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
2026-02-02T15:35:26.380866 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:35:26.380866 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:26.380866 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:35:26.380866 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.380866 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.380866 [FINER] [YamuxStream] [0][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:35:26.380866 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 003006c9f0fd6eca773db849220eded4e541a7e3d1c8001e0b06a77abd34838ff844699f364e38fd723abf76698fae75dc35
2026-02-02T15:35:26.380866 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.380866 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.380866 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.380866 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.382459 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.382459 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.382459 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.382459 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.382459 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.382459 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(aee70594) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:26.382459 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(aee70594) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:26.382982 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.382982 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.382982 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.382982 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.382982 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.382982 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.382982 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.382982 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.382982 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.382982 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(3bfc9160) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:35:26.382982 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(3bfc9160) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 06c9f0fd6eca773db849220eded4e541a7e3d1c8001e0b06a77abd34838ff844699f364e38fd723abf76698fae75dc35
2026-02-02T15:35:26.382982 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:26.382982 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.382982 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:26.382982 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:26.383991 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:26.383991 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:26.383991 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:26.383991 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(23db9e5c) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:26.383991 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(23db9e5c) END (from buffer). Returning 48 bytes: 06c9f0fd6eca773db849220eded4e541a7e3d1c8001e0b06a77abd34838ff844699f364e38fd723abf76698fae75dc35. Buffer after: 0 bytes: 
2026-02-02T15:35:26.383991 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [6, 201, 240, 253]
2026-02-02T15:35:26.383991 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:26.383991 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 06c9f0fd6eca773db849220eded4e541a7e3d1c8001e0b06a77abd34838ff844699f364e38fd723abf76698fae75dc35
2026-02-02T15:35:26.383991 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:26.383991 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:26.383991 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 06c9f0fd6eca773db849220eded4e541a7e3d1c8001e0b06a77abd34838ff844
2026-02-02T15:35:26.383991 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 699f364e38fd723abf76698fae75dc35
2026-02-02T15:35:26.383991 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [6, 201, 240, 253]
2026-02-02T15:35:26.383991 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [105, 159, 54, 78]
2026-02-02T15:35:26.383991 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [105, 159, 54, 78, 56, 253, 114, 58, 191, 118, 105, 143, 174, 117, 220, 53]
2026-02-02T15:35:26.383991 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.383991 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064635575): [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
2026-02-02T15:35:26.384991 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 32 bytes
2026-02-02T15:35:26.384991 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:26.384991 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:35:26.384991 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.385495 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.385495 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:26.385495 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.385495 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.385495 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.385495 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:26.385495 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:26.385495 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:26.385495 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:26.385495 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.385495 [FINE] [YamuxStream] [0][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:26.385495 [FINE] [YamuxStream] [0][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:26.385495 [FINE] [YamuxStream] [0][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:26.385495 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:26.385495 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:26.385495 [FINE] [YamuxStream] [0][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:35:26.385495 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:26.385495 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:35:26.385495 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:26.386505 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:26.386505 [FINER] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Writing 50 bytes: 0030685700c17edad6e8201f8db845892554bf4959d1d33e78628437229b24350429470c334ffe2f2a64e80ac65e52cd681e
2026-02-02T15:35:26.386505 [FINEST] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Flushed 50 bytes successfully. Data preview (hex): 0030685700c17edad6e8201f8db845892554bf49...
2026-02-02T15:35:26.386505 [FINE] [YamuxStream] [0][Server] StreamID=3 Direct write: Successfully wrote all 20 bytes in 1ms
2026-02-02T15:35:26.386505 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:26.386505 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:26.386505 [FINEST] [YamuxStream] [0][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:26.386505 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.386505 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.386505 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.387505 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.387505 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.387505 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.387505 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.387505 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.388010 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.388010 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(b6f8f008) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:26.388010 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(b6f8f008) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:26.388010 [FINEST] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030685700c17edad6e8201f8db845892554bf4959d1d33e78628437229b24350429470c334ffe2f2a64e80ac65e52cd681e
2026-02-02T15:35:26.389014 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(aee70594) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:26.389014 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(aee70594) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 685700c17edad6e8201f8db845892554bf4959d1d33e78628437229b24350429470c334ffe2f2a64e80ac65e52cd681e
2026-02-02T15:35:26.389014 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:26.389014 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.389014 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:26.389014 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:26.389014 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:26.389014 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:26.389014 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:26.389014 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(a0706c0a) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:26.389014 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(a0706c0a) END (from buffer). Returning 48 bytes: 685700c17edad6e8201f8db845892554bf4959d1d33e78628437229b24350429470c334ffe2f2a64e80ac65e52cd681e. Buffer after: 0 bytes: 
2026-02-02T15:35:26.389014 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [104, 87, 0, 193]
2026-02-02T15:35:26.389014 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:26.390013 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 685700c17edad6e8201f8db845892554bf4959d1d33e78628437229b24350429470c334ffe2f2a64e80ac65e52cd681e
2026-02-02T15:35:26.390013 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:26.390013 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:26.390013 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 685700c17edad6e8201f8db845892554bf4959d1d33e78628437229b24350429
2026-02-02T15:35:26.390013 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 470c334ffe2f2a64e80ac65e52cd681e
2026-02-02T15:35:26.390013 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [104, 87, 0, 193]
2026-02-02T15:35:26.390517 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [71, 12, 51, 79]
2026-02-02T15:35:26.390517 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [71, 12, 51, 79, 254, 47, 42, 100, 232, 10, 198, 94, 82, 205, 104, 30]
2026-02-02T15:35:26.390517 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.390517 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059730016): [10, 32, 200, 192, 148, 10, 84, 24, 166, 217, 78, 62, 33, 82, 238, 247, 120, 174, 240, 98, 43, 63, 125, 98, 100, 221, 181, 185, 93, 226, 221, 227]
2026-02-02T15:35:26.391022 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 32 bytes
2026-02-02T15:35:26.391022 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:26.391022 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:35:26.391022 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.391022 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.391022 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:26.391022 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.391534 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.391534 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.391534 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:26.391534 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:26.391534 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:26.391534 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:26.391534 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.391534 [FINE] [YamuxStream] [1][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:26.391534 [FINE] [YamuxStream] [1][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:26.391534 [FINE] [YamuxStream] [1][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:26.391534 [FINE] [YamuxStream] [1][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 23 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:35:26.392620 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 35, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 23, 22, 47, 116, 101, 115, 116, 47, 98])
2026-02-02T15:35:26.392620 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:35:26.392620 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 51 bytes (plaintext was 35)
2026-02-02T15:35:26.392620 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 53
2026-02-02T15:35:26.392620 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 53 bytes: 00335705e56c7c6d3d9b1547f7207ed6decd9cb972d7c5327fbc37af5ddf77633d9fd7c04b488b477ffc950e744afadcb1a57d3538
2026-02-02T15:35:26.392620 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.392620 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.392620 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.392620 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.392620 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.392620 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.392620 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.392620 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.394124 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.394124 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(8c1432cf) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:26.394124 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(8c1432cf) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:26.394124 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (53 bytes): 00335705e56c7c6d3d9b1547f7207ed6decd9cb972d7c5327fbc37af5ddf77633d9fd7c04b488b477ffc950e744afadcb1a57d3538
2026-02-02T15:35:26.394124 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(b6f8f008) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:26.394124 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(b6f8f008) END (from buffer). Returning 2 bytes: 0033. Buffer after: 51 bytes: 5705e56c7c6d3d9b1547f7207ed6decd9cb972d7c5327fbc37af5ddf77633d9fd7c04b488b477ffc950e744afadcb1a57d3538
2026-02-02T15:35:26.394124 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 51]
2026-02-02T15:35:26.394124 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.394124 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 51]
2026-02-02T15:35:26.394124 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0033
2026-02-02T15:35:26.394124 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 51
2026-02-02T15:35:26.394124 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 51
2026-02-02T15:35:26.394692 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 51 more bytes (have 0/51)
2026-02-02T15:35:26.394692 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(10d2c9b6) START. Requested: 51. Buffer: 51 bytes.
2026-02-02T15:35:26.394692 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(10d2c9b6) END (from buffer). Returning 51 bytes: 5705e56c7c6d3d9b1547f7207ed6decd9cb972d7c5327fbc37af5ddf77633d9fd7c04b488b477ffc950e744afadcb1a57d3538. Buffer after: 0 bytes: 
2026-02-02T15:35:26.394692 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 51 bytes. First 4 bytes: [87, 5, 229, 108]
2026-02-02T15:35:26.394692 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 51, Got: 51
2026-02-02T15:35:26.394692 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 51, Bytes: 5705e56c7c6d3d9b1547f7207ed6decd9cb972d7c5327fbc37af5ddf77633d9fd7c04b488b477ffc950e744afadcb1a57d3538
2026-02-02T15:35:26.394692 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 51
2026-02-02T15:35:26.394692 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(35) and MAC(16)
2026-02-02T15:35:26.394692 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 5705e56c7c6d3d9b1547f7207ed6decd9cb972d7c5327fbc37af5ddf77633d9fd7c04b
2026-02-02T15:35:26.394692 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 488b477ffc950e744afadcb1a57d3538
2026-02-02T15:35:26.394692 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [87, 5, 229, 108]
2026-02-02T15:35:26.394692 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [72, 139, 71, 127]
2026-02-02T15:35:26.394692 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [72, 139, 71, 127, 252, 149, 14, 116, 74, 250, 220, 177, 165, 125, 53, 56]
2026-02-02T15:35:26.394692 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.394692 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064635575): [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
2026-02-02T15:35:26.395700 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 35 bytes
2026-02-02T15:35:26.395700 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 35 bytes to _decryptedBuffer. New _decryptedBuffer.length: 35
2026-02-02T15:35:26.395700 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 23. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 23]
2026-02-02T15:35:26.395700 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.395700 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.395700 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=23
2026-02-02T15:35:26.395700 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.395700 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.395700 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.395700 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=23
2026-02-02T15:35:26.395700 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 23, _decryptedBuffer.length: 23
2026-02-02T15:35:26.395700 [FINER] [SecuredConnection] SecuredConnection.read (length=23): Returning 23 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [22, 47, 116, 101, 115, 116, 47, 98, 114, 111, 97, 100, 99, 97, 115, 116, 47, 49, 46, 48]
2026-02-02T15:35:26.395700 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=23
2026-02-02T15:35:26.395700 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.395700 [FINE] [YamuxStream] [0][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 23, flags: 0
2026-02-02T15:35:26.395700 [FINE] [YamuxStream] [0][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 23 bytes directly to waiting reader
2026-02-02T15:35:26.397161 [FINE] [YamuxStream] [0][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 43
2026-02-02T15:35:26.397161 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/test/broadcast/1.0.0"
2026-02-02T15:35:26.397161 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/test/broadcast/1.0.0"
2026-02-02T15:35:26.397161 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/test/broadcast/1.0.0". Sending acknowledgment: "/test/broadcast/1.0.0".
2026-02-02T15:35:26.397161 [FINE] [YamuxStream] [0][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 23 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:35:26.397666 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 35, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 23, 22, 47, 116, 101, 115, 116, 47, 98])
2026-02-02T15:35:26.397666 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
2026-02-02T15:35:26.397666 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 51 bytes (plaintext was 35)
2026-02-02T15:35:26.397666 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 53
2026-02-02T15:35:26.397666 [FINER] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Writing 53 bytes: 003360877edc35ce5ac41eb3e14ec79ec94f63055cd87e7d9a858c617445a53c7bf2f6625a41cdcd29970dc6a0177c1beab81bcd22
2026-02-02T15:35:26.398180 [FINEST] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Flushed 53 bytes successfully. Data preview (hex): 003360877edc35ce5ac41eb3e14ec79ec94f6305...
2026-02-02T15:35:26.398180 [FINE] [YamuxStream] [0][Server] StreamID=3 Direct write: Successfully wrote all 23 bytes in 1ms
2026-02-02T15:35:26.398180 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/test/broadcast/1.0.0".
2026-02-02T15:35:26.398180 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/test/broadcast/1.0.0" and its handler.
2026-02-02T15:35:26.398180 [FINE] [multistream] [multistreamMuxer - handle] Protocol /test/broadcast/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:26.398180 [FINE] [StreamScopeImpl] stream-1770068126375-6523: Setting protocol to /test/broadcast/1.0.0 for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:26.398180 [FINE] [ResourceManagerImpl] Creating new protocol scope: /test/broadcast/1.0.0
2026-02-02T15:35:26.398180 [FINE] [StreamScopeImpl] stream-1770068126375-6523: Successfully set protocol to /test/broadcast/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:26.399183 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /test/broadcast/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:35:26.399183 [FINEST] [YamuxStream] [0][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:26.399183 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 53 bytes successfully. Data preview (hex): 00335705e56c7c6d3d9b1547f7207ed6decd9cb9...
2026-02-02T15:35:26.399183 [FINE] [YamuxStream] [1][Client] StreamID=3 Direct write: Successfully wrote all 23 bytes in 7ms
2026-02-02T15:35:26.399183 [FINEST] [YamuxStream] [1][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:26.399183 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.399183 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.399183 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.399183 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.399183 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.399183 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.399183 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.399183 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.399183 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.399183 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(43f15ce0) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:26.399183 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(43f15ce0) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:26.401084 [FINEST] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - RAW_SOCKET_DATA_CHUNK_RECV (53 bytes): 003360877edc35ce5ac41eb3e14ec79ec94f63055cd87e7d9a858c617445a53c7bf2f6625a41cdcd29970dc6a0177c1beab81bcd22
2026-02-02T15:35:26.401084 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(8c1432cf) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:26.401084 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(8c1432cf) END (from buffer). Returning 2 bytes: 0033. Buffer after: 51 bytes: 60877edc35ce5ac41eb3e14ec79ec94f63055cd87e7d9a858c617445a53c7bf2f6625a41cdcd29970dc6a0177c1beab81bcd22
2026-02-02T15:35:26.401084 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 51]
2026-02-02T15:35:26.401084 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.401084 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 51]
2026-02-02T15:35:26.401084 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0033
2026-02-02T15:35:26.401084 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 51
2026-02-02T15:35:26.401084 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 51
2026-02-02T15:35:26.401598 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 51 more bytes (have 0/51)
2026-02-02T15:35:26.401598 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(22dff2b2) START. Requested: 51. Buffer: 51 bytes.
2026-02-02T15:35:26.401598 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(22dff2b2) END (from buffer). Returning 51 bytes: 60877edc35ce5ac41eb3e14ec79ec94f63055cd87e7d9a858c617445a53c7bf2f6625a41cdcd29970dc6a0177c1beab81bcd22. Buffer after: 0 bytes: 
2026-02-02T15:35:26.401598 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 51 bytes. First 4 bytes: [96, 135, 126, 220]
2026-02-02T15:35:26.401598 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 51, Got: 51
2026-02-02T15:35:26.401598 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 51, Bytes: 60877edc35ce5ac41eb3e14ec79ec94f63055cd87e7d9a858c617445a53c7bf2f6625a41cdcd29970dc6a0177c1beab81bcd22
2026-02-02T15:35:26.401598 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 51
2026-02-02T15:35:26.401598 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(35) and MAC(16)
2026-02-02T15:35:26.401598 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 60877edc35ce5ac41eb3e14ec79ec94f63055cd87e7d9a858c617445a53c7bf2f6625a
2026-02-02T15:35:26.401598 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 41cdcd29970dc6a0177c1beab81bcd22
2026-02-02T15:35:26.401598 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [96, 135, 126, 220]
2026-02-02T15:35:26.401598 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [65, 205, 205, 41]
2026-02-02T15:35:26.401598 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [65, 205, 205, 41, 151, 13, 198, 160, 23, 124, 27, 234, 184, 27, 205, 34]
2026-02-02T15:35:26.401598 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=11 ([0, 0, 0, 0, 11, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.401598 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059730016): [10, 32, 200, 192, 148, 10, 84, 24, 166, 217, 78, 62, 33, 82, 238, 247, 120, 174, 240, 98, 43, 63, 125, 98, 100, 221, 181, 185, 93, 226, 221, 227]
2026-02-02T15:35:26.401598 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=11, got 35 bytes
2026-02-02T15:35:26.401598 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 35 bytes to _decryptedBuffer. New _decryptedBuffer.length: 35
2026-02-02T15:35:26.401598 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 23. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 23]
2026-02-02T15:35:26.401598 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.401598 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.402669 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=23
2026-02-02T15:35:26.402669 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.402669 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.402669 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.402669 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=23
2026-02-02T15:35:26.402669 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 23, _decryptedBuffer.length: 23
2026-02-02T15:35:26.402669 [FINER] [SecuredConnection] SecuredConnection.read (length=23): Returning 23 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [22, 47, 116, 101, 115, 116, 47, 98, 114, 111, 97, 100, 99, 97, 115, 116, 47, 49, 46, 48]
2026-02-02T15:35:26.402669 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=23
2026-02-02T15:35:26.402669 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.402669 [FINE] [YamuxStream] [1][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 23, flags: 0
2026-02-02T15:35:26.402669 [FINE] [YamuxStream] [1][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 23 bytes directly to waiting reader
2026-02-02T15:35:26.402669 [FINE] [YamuxStream] [1][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 43
2026-02-02T15:35:26.402669 [WARNING] [basichost] ✅ [newStream Phase 4] Protocol negotiated: /test/broadcast/1.0.0 on stream 3
2026-02-02T15:35:26.402669 [FINE] [YamuxStream] [1][Client] StreamID=3 setDeadline() cleared (set to null)
2026-02-02T15:35:26.402669 [WARNING] [basichost] 🎯 [newStream Phase 5] Setting up protocol /test/broadcast/1.0.0 on stream 3...
2026-02-02T15:35:26.402669 [FINE] [StreamScopeImpl] stream-1770068126372-5985: Setting protocol to /test/broadcast/1.0.0 for peer 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:26.402669 [FINE] [ResourceManagerImpl] Creating new protocol scope: /test/broadcast/1.0.0
2026-02-02T15:35:26.402669 [FINE] [StreamScopeImpl] stream-1770068126372-5985: Successfully set protocol to /test/broadcast/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:26.404173 [WARNING] [basichost] ✅ [newStream Phase 5] Protocol setup complete for stream 3
2026-02-02T15:35:26.404173 [WARNING] [basichost] ✅ [newStream] COMPLETE - Returning stream 3 with protocol /test/broadcast/1.0.0
2026-02-02T15:35:26.405716 [FINE] [YamuxStream] [1][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 3 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524245
2026-02-02T15:35:26.405716 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 15, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 3, 2, 104, 105])
2026-02-02T15:35:26.406064 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
2026-02-02T15:35:26.406064 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 31 bytes (plaintext was 15)
2026-02-02T15:35:26.406064 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 33
2026-02-02T15:35:26.406064 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 33 bytes: 001fd335261c15172a3321205b917644f17d3ca549f7908146ff00133ca7f70fe8
2026-02-02T15:35:26.406064 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.406064 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.406064 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.406064 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.406064 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.406064 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.406064 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.406064 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.406064 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.406064 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(7ecffaef) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:26.406064 [FINER] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Read(7ecffaef) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:26.406064 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (33 bytes): 001fd335261c15172a3321205b917644f17d3ca549f7908146ff00133ca7f70fe8
2026-02-02T15:35:26.406064 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(43f15ce0) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:26.406064 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(43f15ce0) END (from buffer). Returning 2 bytes: 001f. Buffer after: 31 bytes: d335261c15172a3321205b917644f17d3ca549f7908146ff00133ca7f70fe8
2026-02-02T15:35:26.406064 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 31]
2026-02-02T15:35:26.406064 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.406064 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 31]
2026-02-02T15:35:26.407569 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001f
2026-02-02T15:35:26.407569 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 31
2026-02-02T15:35:26.407569 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 31
2026-02-02T15:35:26.407569 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 31 more bytes (have 0/31)
2026-02-02T15:35:26.407895 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(7e9019c7) START. Requested: 31. Buffer: 31 bytes.
2026-02-02T15:35:26.407895 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(7e9019c7) END (from buffer). Returning 31 bytes: d335261c15172a3321205b917644f17d3ca549f7908146ff00133ca7f70fe8. Buffer after: 0 bytes: 
2026-02-02T15:35:26.407895 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 31 bytes. First 4 bytes: [211, 53, 38, 28]
2026-02-02T15:35:26.407895 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 31, Got: 31
2026-02-02T15:35:26.407895 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 31, Bytes: d335261c15172a3321205b917644f17d3ca549f7908146ff00133ca7f70fe8
2026-02-02T15:35:26.407895 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 31
2026-02-02T15:35:26.407895 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(15) and MAC(16)
2026-02-02T15:35:26.407895 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: d335261c15172a3321205b917644f1
2026-02-02T15:35:26.407895 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 7d3ca549f7908146ff00133ca7f70fe8
2026-02-02T15:35:26.407895 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [211, 53, 38, 28]
2026-02-02T15:35:26.407895 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [125, 60, 165, 73]
2026-02-02T15:35:26.407895 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [125, 60, 165, 73, 247, 144, 129, 70, 255, 0, 19, 60, 167, 247, 15, 232]
2026-02-02T15:35:26.407895 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=11 ([0, 0, 0, 0, 11, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.407895 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064635575): [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
2026-02-02T15:35:26.407895 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=11, got 15 bytes
2026-02-02T15:35:26.407895 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 15 bytes to _decryptedBuffer. New _decryptedBuffer.length: 15
2026-02-02T15:35:26.407895 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 3. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 3]
2026-02-02T15:35:26.407895 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.407895 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.407895 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=3
2026-02-02T15:35:26.407895 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.407895 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.408901 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.408901 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=3
2026-02-02T15:35:26.408901 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 3, _decryptedBuffer.length: 3
2026-02-02T15:35:26.408901 [FINER] [SecuredConnection] SecuredConnection.read (length=3): Returning 3 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [2, 104, 105]
2026-02-02T15:35:26.408901 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=3
2026-02-02T15:35:26.408901 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.408901 [FINE] [YamuxStream] [0][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 3, flags: 0
2026-02-02T15:35:26.408901 [FINE] [YamuxStream] [0][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 3 bytes directly to waiting reader
2026-02-02T15:35:26.408901 [FINE] [YamuxStream] [0][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 46
2026-02-02T15:35:26.408901 [FINEST] [YamuxStream] [0][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:26.408901 [FINEST] [YamuxStream] [0][Server] StreamID=3 read() returning 2 bytes from queue.
2026-02-02T15:35:26.409914 [FINEST] [YamuxStream] [0][Server] StreamID=3 read() requested maxLength 1, data is 2. Returning partial and re-queuing 1 bytes.
2026-02-02T15:35:26.409914 [FINEST] [YamuxStream] [0][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:26.409914 [FINEST] [YamuxStream] [0][Server] StreamID=3 read() returning 1 bytes from queue.
2026-02-02T15:35:26.409914 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 33 bytes successfully. Data preview (hex): 001fd335261c15172a3321205b917644f17d3ca5...
2026-02-02T15:35:26.409914 [FINE] [YamuxStream] [1][Client] StreamID=3 Direct write: Successfully wrote all 3 bytes in 4ms
2026-02-02T15:35:26.410923 [FINE] [SwarmStream] Closing stream 3
2026-02-02T15:35:26.411974 [FINE] [YamuxStream] [1][Client] StreamID=3 close() called. Current state: YamuxStreamState.open
2026-02-02T15:35:26.411974 [FINER] [YamuxStream] [1][Client] StreamID=3 Sending pending WINDOW_UPDATE for 43 consumed bytes before local FIN.
2026-02-02T15:35:26.411974 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 0, 0, 43])
2026-02-02T15:35:26.411974 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=12
2026-02-02T15:35:26.411974 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:26.411974 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:26.411974 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 30 bytes: 001c43a3d09d2a08f5b15c3250a33e4f9fe5f27cb1793f1ed9945975c91c
2026-02-02T15:35:26.411974 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.413481 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.413481 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.413481 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.413481 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.413481 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.413481 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.413481 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.413481 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.413481 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(8be107a0) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:26.413481 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(8be107a0) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:26.413481 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c43a3d09d2a08f5b15c3250a33e4f9fe5f27cb1793f1ed9945975c91c
2026-02-02T15:35:26.413481 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(8be107a0) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:26.413481 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(8be107a0) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 43a3d09d2a08f5b15c3250a33e4f9fe5f27cb1793f1ed9945975c91c
2026-02-02T15:35:26.413481 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:26.413481 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.413481 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:26.413481 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:26.413481 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:26.413481 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:26.414486 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:26.414486 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(e9a089b8) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:26.414486 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(e9a089b8) END (from buffer). Returning 28 bytes: 43a3d09d2a08f5b15c3250a33e4f9fe5f27cb1793f1ed9945975c91c. Buffer after: 0 bytes: 
2026-02-02T15:35:26.414486 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [67, 163, 208, 157]
2026-02-02T15:35:26.414486 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:26.414486 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 43a3d09d2a08f5b15c3250a33e4f9fe5f27cb1793f1ed9945975c91c
2026-02-02T15:35:26.414486 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:26.414486 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:26.414990 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 43a3d09d2a08f5b15c3250a3
2026-02-02T15:35:26.414990 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 3e4f9fe5f27cb1793f1ed9945975c91c
2026-02-02T15:35:26.414990 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [67, 163, 208, 157]
2026-02-02T15:35:26.414990 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [62, 79, 159, 229]
2026-02-02T15:35:26.414990 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [62, 79, 159, 229, 242, 124, 177, 121, 63, 30, 217, 148, 89, 117, 201, 28]
2026-02-02T15:35:26.414990 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=12 ([0, 0, 0, 0, 12, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.414990 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064635575): [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
2026-02-02T15:35:26.414990 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=12, got 12 bytes
2026-02-02T15:35:26.414990 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:26.414990 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 0, 0, 43]
2026-02-02T15:35:26.414990 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.414990 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.414990 [FINER] [YamuxStream] [0][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 43. Current our send window: 524245, New: 524288
2026-02-02T15:35:26.414990 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 30 bytes successfully. Data preview (hex): 001c43a3d09d2a08f5b15c3250a33e4f9fe5f27c...
2026-02-02T15:35:26.414990 [FINER] [YamuxStream] [1][Client] StreamID=3 Sending FIN frame (DATA frame with FIN flag) for local close().
2026-02-02T15:35:26.415993 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:35:26.415993 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=13
2026-02-02T15:35:26.415993 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:26.415993 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:26.415993 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 30 bytes: 001c43741b15ee71a367b86fe75a2da220d882eb4a5b8c1b78c629180c00
2026-02-02T15:35:26.415993 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 30 bytes successfully. Data preview (hex): 001c43741b15ee71a367b86fe75a2da220d882eb...
2026-02-02T15:35:26.415993 [FINER] [YamuxStream] [1][Client] StreamID=3 close() ensuring cleanup. State before final cleanup: YamuxStreamState.closed (was YamuxStreamState.open).
2026-02-02T15:35:26.416993 [FINER] [YamuxStream] [1][Client] StreamID=3 _cleanup() called. State before cleanup: YamuxStreamState.closed
2026-02-02T15:35:26.416993 [FINER] [YamuxStream] [1][Client] StreamID=3 _cleanup() - state set to: YamuxStreamState.closed (was YamuxStreamState.closed)
2026-02-02T15:35:26.416993 [FINER] [YamuxStream] [1][Client] StreamID=3 _cleanup() closing incomingController.
2026-02-02T15:35:26.416993 [FINE] [YamuxStream] [1][Client] StreamID=3 _cleanup() finished. Final state: YamuxStreamState.closed
2026-02-02T15:35:26.416993 [FINE] [YamuxStream] [1][Client] StreamID=3 close() completed. Final state: YamuxStreamState.closed
2026-02-02T15:35:26.416993 [FINE] [SwarmStream] Stream 3: Cleaning up management scope
2026-02-02T15:35:26.417993 [FINE] [SwarmStream] Stream 3 closed
2026-02-02T15:35:26.417993 [FINE] [Libp2pRouter] [VERBOSE] Message sent successfully to 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:26.417993 [FINE] [Libp2pRouter] [VERBOSE] Sending message to 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C via protocol /test/broadcast/1.0.0
2026-02-02T15:35:26.418994 [WARNING] [basichost] 🎯 [newStream] ENTERED for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C, protocols: [/test/broadcast/1.0.0]
2026-02-02T15:35:26.418994 [WARNING] [basichost] 🎯 [newStream Phase 1] Connecting to peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C...
2026-02-02T15:35:26.418994 [WARNING] [basichost] ✅ [newStream Phase 1] Connected to peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:26.418994 [WARNING] [basichost] 🎯 [newStream Phase 2] Creating stream to peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C...
2026-02-02T15:35:26.418994 [WARNING] [Swarm] Swarm.newStream: Entered for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C. Context HashCode: 398016241
2026-02-02T15:35:26.418994 [WARNING] [Swarm] Swarm.newStream: Swarm is open for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C.
2026-02-02T15:35:26.418994 [WARNING] [Swarm] Swarm.newStream: Calling dialPeer(context, 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C).
2026-02-02T15:35:26.418994 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C, existing_conns=2
2026-02-02T15:35:26.418994 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C"
2026-02-02T15:35:26.418994 [FINE] [Swarm] Found 1 existing connections for peer ID string: "12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C"
2026-02-02T15:35:26.418994 [FINE] [Swarm] Swarm.dialPeer: Found 1 existing connection(s) for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C. Validating health...
2026-02-02T15:35:26.418994 [WARNING] [Swarm] Swarm.dialPeer: Found healthy connection for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C. Returning newest connection ID: 1
2026-02-02T15:35:26.420205 [WARNING] [Swarm] Swarm.newStream: Successfully dialed peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C. Conn runtimeType: SwarmConn, Conn ID: 1, Conn local: 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc, Conn remote: 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:26.420205 [WARNING] [Swarm] Swarm.newStream: About to call (conn as SwarmConn).newStream() for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C on SwarmConn 1.
2026-02-02T15:35:26.420205 [FINE] [SwarmConn] SwarmConn.newStream (1): Entered to peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C. Context HashCode: 398016241
2026-02-02T15:35:26.420205 [FINE] [SwarmConn] SwarmConn.newStream (1): Connection is open.
2026-02-02T15:35:26.420205 [FINE] [SwarmConn] SwarmConn.newStream (1): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:35:26.420205 [FINE] [SwarmConn] SwarmConn.newStream (1): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:35:26.420205 [FINE] [YamuxStream] [3][Client] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:26.420205 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:35:26.420205 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:35:26.421475 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:26.421475 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:26.421475 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 30 bytes: 001cdf427debf1453d57a6da52871be98b032a327a168df6d038996ec908
2026-02-02T15:35:26.422474 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 30 bytes successfully. Data preview (hex): 001cdf427debf1453d57a6da52871be98b032a32...
2026-02-02T15:35:26.422474 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.422474 [FINE] [ambient_autonat_v2] Probe generation 2 cancelled (current: 3)
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.422978 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.422978 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.422978 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.422978 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.422978 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.422978 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.422978 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.422978 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.422978 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(447a9019) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:26.422978 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(447a9019) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:26.422978 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c43741b15ee71a367b86fe75a2da220d882eb4a5b8c1b78c629180c00
2026-02-02T15:35:26.422978 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(447a9019) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:26.422978 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(447a9019) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 43741b15ee71a367b86fe75a2da220d882eb4a5b8c1b78c629180c00
2026-02-02T15:35:26.422978 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:26.422978 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.422978 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:26.422978 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:26.422978 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:26.422978 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:26.422978 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:26.422978 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(f95c1ddd) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:26.422978 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(f95c1ddd) END (from buffer). Returning 28 bytes: 43741b15ee71a367b86fe75a2da220d882eb4a5b8c1b78c629180c00. Buffer after: 0 bytes: 
2026-02-02T15:35:26.422978 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [67, 116, 27, 21]
2026-02-02T15:35:26.422978 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:26.422978 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 43741b15ee71a367b86fe75a2da220d882eb4a5b8c1b78c629180c00
2026-02-02T15:35:26.422978 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:26.422978 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:26.424208 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 43741b15ee71a367b86fe75a
2026-02-02T15:35:26.424208 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2da220d882eb4a5b8c1b78c629180c00
2026-02-02T15:35:26.424208 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [67, 116, 27, 21]
2026-02-02T15:35:26.424208 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [45, 162, 32, 216]
2026-02-02T15:35:26.424208 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [45, 162, 32, 216, 130, 235, 74, 91, 140, 27, 120, 198, 41, 24, 12, 0]
2026-02-02T15:35:26.424208 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=13 ([0, 0, 0, 0, 13, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.424208 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064635575): [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
2026-02-02T15:35:26.424715 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=13, got 12 bytes
2026-02-02T15:35:26.424715 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:26.424715 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:35:26.424715 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.424715 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.424715 [FINE] [YamuxStream] [0][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:26.424715 [FINE] [YamuxStream] [0][Server] StreamID=3 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:35:26.424715 [FINE] [YamuxStream] [0][Server] StreamID=3 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=false, queueSize=0
2026-02-02T15:35:26.424715 [FINEST] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cdf427debf1453d57a6da52871be98b032a327a168df6d038996ec908
2026-02-02T15:35:26.425720 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(289ff488) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:26.425720 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(289ff488) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: df427debf1453d57a6da52871be98b032a327a168df6d038996ec908
2026-02-02T15:35:26.425720 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:26.425720 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.425720 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:26.426225 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:26.426225 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:26.426225 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:26.426225 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:26.426225 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(8902bb3e) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:26.426225 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(8902bb3e) END (from buffer). Returning 28 bytes: df427debf1453d57a6da52871be98b032a327a168df6d038996ec908. Buffer after: 0 bytes: 
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.427229 [FINE] [SwarmStream] Closing stream 1
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.427229 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [223, 66, 125, 235]
2026-02-02T15:35:26.427229 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:26.428229 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: df427debf1453d57a6da52871be98b032a327a168df6d038996ec908
2026-02-02T15:35:26.428229 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:26.428229 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:26.428229 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: df427debf1453d57a6da5287
2026-02-02T15:35:26.428229 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 1be98b032a327a168df6d038996ec908
2026-02-02T15:35:26.428229 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [223, 66, 125, 235]
2026-02-02T15:35:26.429229 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [27, 233, 139, 3]
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.429229 [FINE] [YamuxStream] [1][Client] StreamID=1 close() called. Current state: YamuxStreamState.closing
2026-02-02T15:35:26.429803 [FINER] [YamuxStream] [1][Client] StreamID=1 Sending FIN frame (DATA frame with FIN flag) for local close().
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.429803 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [27, 233, 139, 3, 42, 50, 122, 22, 141, 246, 208, 56, 153, 110, 201, 8]
2026-02-02T15:35:26.429803 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.429803 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057500832): [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.429803 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.429803 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.429803 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.429803 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.429803 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:26.430807 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:26.430807 [FINER] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Writing 30 bytes: 001c1762e609484caa0ce1cf2e8d9b50fdb99c47fe854c0e43f5e4da0409
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.430807 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:35:26.430807 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.430807 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.431312 [FINEST] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Flushed 30 bytes successfully. Data preview (hex): 001c1762e609484caa0ce1cf2e8d9b50fdb99c47...
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.431312 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:35:26.431312 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.431312 [FINER] [YamuxStream] [1][Client] StreamID=1 close() ensuring cleanup. State before final cleanup: YamuxStreamState.closed (was YamuxStreamState.closing).
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.431312 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:26.431312 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:26.431312 [FINER] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Writing 30 bytes: 001c872cc81e6b70bd2301567e8e596ceac17db239b4f76165203baab174
2026-02-02T15:35:26.431312 [FINEST] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Flushed 30 bytes successfully. Data preview (hex): 001c872cc81e6b70bd2301567e8e596ceac17db2...
2026-02-02T15:35:26.432316 [FINE] [YamuxStream] [2][Server] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:26.432316 [FINER] [YamuxStream] [2][Server] StreamID=3 open() called. Current state: YamuxStreamState.init
2026-02-02T15:35:26.432316 [FINE] [YamuxStream] [2][Server] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:26.432316 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.432316 [FINER] [YamuxStream] [1][Client] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.closed
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.432316 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.432316 [FINER] [YamuxStream] [1][Client] StreamID=1 _cleanup() - state set to: YamuxStreamState.closed (was YamuxStreamState.closed)
2026-02-02T15:35:26.432316 [FINER] [YamuxStream] [1][Client] StreamID=1 _cleanup() closing incomingController.
2026-02-02T15:35:26.432316 [FINE] [YamuxStream] [1][Client] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.closed
2026-02-02T15:35:26.432316 [FINE] [YamuxStream] [1][Client] StreamID=1 close() completed. Final state: YamuxStreamState.closed
2026-02-02T15:35:26.433315 [FINE] [SwarmStream] Stream 1: Cleaning up management scope
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.433315 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:26.434315 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.434315 [FINE] [SwarmStream] Stream 1 closed
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.434315 [FINER] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Writing 30 bytes: 001c6fea8289c6368ea22f6256147986162a6ef97061b7334e8cb4c1f5d3
2026-02-02T15:35:26.435315 [FINEST] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Flushed 30 bytes successfully. Data preview (hex): 001c6fea8289c6368ea22f6256147986162a6ef9...
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.435821 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.436478 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.436478 [FINER] [YamuxStream] [2][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.436478 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:26.436478 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.436478 [FINE] [Swarm] Accepted inbound stream 3 from 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc on conn 0
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.436478 [FINER] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Writing 30 bytes: 001c66d96bed067c4d19153c3a612850d47224764c87a956ad3b8b0a0d9a
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.436478 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068126436-6523 for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:26.436478 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.437983 [FINEST] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - RAW_SOCKET_DATA_CHUNK_RECV (60 bytes): 001c1762e609484caa0ce1cf2e8d9b50fdb99c47fe854c0e43f5e4da0409001c66d96bed067c4d19153c3a612850d47224764c87a956ad3b8b0a0d9a
2026-02-02T15:35:26.437983 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(6af84d79) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:26.437983 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(6af84d79) END (from buffer). Returning 2 bytes: 001c. Buffer after: 58 bytes: 1762e609484caa0ce1cf2e8d9b50fdb99c47fe854c0e43f5e4da0409001c66d96bed067c4d19153c3a612850d47224764c87a956ad3b8b0a0d9a
2026-02-02T15:35:26.437983 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:26.437983 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.438999 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:26.438999 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:26.438999 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:26.439999 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:26.439999 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:26.439999 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(892053ca) START. Requested: 28. Buffer: 58 bytes.
2026-02-02T15:35:26.439999 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(892053ca) END (from buffer). Returning 28 bytes: 1762e609484caa0ce1cf2e8d9b50fdb99c47fe854c0e43f5e4da0409. Buffer after: 30 bytes: 001c66d96bed067c4d19153c3a612850d47224764c87a956ad3b8b0a0d9a
2026-02-02T15:35:26.440504 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [23, 98, 230, 9]
2026-02-02T15:35:26.440504 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:26.440504 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 1762e609484caa0ce1cf2e8d9b50fdb99c47fe854c0e43f5e4da0409
2026-02-02T15:35:26.440504 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:26.440504 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:26.440504 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 1762e609484caa0ce1cf2e8d
2026-02-02T15:35:26.440504 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 9b50fdb99c47fe854c0e43f5e4da0409
2026-02-02T15:35:26.440504 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [23, 98, 230, 9]
2026-02-02T15:35:26.440504 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [155, 80, 253, 185]
2026-02-02T15:35:26.440504 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [155, 80, 253, 185, 156, 71, 254, 133, 76, 14, 67, 245, 228, 218, 4, 9]
2026-02-02T15:35:26.440504 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.441509 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1060023569): [105, 157, 36, 165, 38, 0, 57, 38, 136, 226, 64, 234, 15, 196, 99, 77, 12, 54, 66, 167, 236, 175, 117, 8, 8, 119, 94, 20, 9, 239, 23, 88]
2026-02-02T15:35:26.441509 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:35:26.441509 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:26.441509 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:26.441509 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.441509 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.442509 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:26.442509 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:35:26.442509 [FINEST] [TCPConnection] TCPConnection.write (id: c467625c-f5d7-4e86-bc57-cfb579c0b5a6): Flushed 30 bytes successfully. Data preview (hex): 001c66d96bed067c4d19153c3a612850d4722476...
2026-02-02T15:35:26.443509 [FINE] [YamuxStream] [1][Client] StreamID=1 forceReset() called. Current state: YamuxStreamState.closed
2026-02-02T15:35:26.444507 [FINER] [YamuxStream] [1][Client] StreamID=1 forceReset() called but stream already closed/reset. State: YamuxStreamState.closed. Doing nothing.
2026-02-02T15:35:26.444507 [FINE] [Swarm] AcceptStream loop for conn 0 to 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw terminated due to connection closure.
2026-02-02T15:35:26.449547 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Error in _readAndDecryptMessage: Bad state: Connection closed while a read was pending. Current _decryptedBuffer.length: 0
2026-02-02T15:35:26.449547 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.450546 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.451546 [FINE] [TCPConnection] TCPConnection(c467625c-f5d7-4e86-bc57-cfb579c0b5a6) - Connection closed.
2026-02-02T15:35:26.452546 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.452546 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.452546 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.452546 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.453546 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.453546 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.453546 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.453546 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.453546 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.453546 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(ba84b173) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:26.453546 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(ba84b173) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 66d96bed067c4d19153c3a612850d47224764c87a956ad3b8b0a0d9a
2026-02-02T15:35:26.453546 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:26.454545 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.454545 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:26.454545 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:26.454545 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:26.454545 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:26.454545 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:26.454545 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(ed8fcbcd) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:26.455545 [FINER] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Read(ed8fcbcd) END (from buffer). Returning 28 bytes: 66d96bed067c4d19153c3a612850d47224764c87a956ad3b8b0a0d9a. Buffer after: 0 bytes: 
2026-02-02T15:35:26.455545 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [102, 217, 107, 237]
2026-02-02T15:35:26.455545 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:26.455545 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 66d96bed067c4d19153c3a612850d47224764c87a956ad3b8b0a0d9a
2026-02-02T15:35:26.455545 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:26.455545 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:26.455545 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 66d96bed067c4d19153c3a61
2026-02-02T15:35:26.455545 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2850d47224764c87a956ad3b8b0a0d9a
2026-02-02T15:35:26.455545 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [102, 217, 107, 237]
2026-02-02T15:35:26.456544 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [40, 80, 212, 114]
2026-02-02T15:35:26.456544 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [40, 80, 212, 114, 36, 118, 76, 135, 169, 86, 173, 59, 139, 10, 13, 154]
2026-02-02T15:35:26.456544 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.456544 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1060023569): [105, 157, 36, 165, 38, 0, 57, 38, 136, 226, 64, 234, 15, 196, 99, 77, 12, 54, 66, 167, 236, 175, 117, 8, 8, 119, 94, 20, 9, 239, 23, 88]
2026-02-02T15:35:26.457049 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:35:26.457049 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:26.457049 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]
2026-02-02T15:35:26.457049 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.457049 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.458054 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.461052 [FINEST] [YamuxStream] [2][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:26.462052 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.462052 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.462052 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.462052 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.462052 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.462052 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.462052 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.462052 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.463557 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.463557 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(bbfa7e2a) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:26.463557 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(bbfa7e2a) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:26.463557 [FINEST] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c872cc81e6b70bd2301567e8e596ceac17db239b4f76165203baab174
2026-02-02T15:35:26.463557 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(b97be759) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:26.463557 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(b97be759) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 872cc81e6b70bd2301567e8e596ceac17db239b4f76165203baab174
2026-02-02T15:35:26.463557 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:26.463557 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.463557 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:26.463557 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:26.463557 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:26.463557 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:26.463557 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:26.463557 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(a11c30f7) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:26.464573 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(a11c30f7) END (from buffer). Returning 28 bytes: 872cc81e6b70bd2301567e8e596ceac17db239b4f76165203baab174. Buffer after: 0 bytes: 
2026-02-02T15:35:26.464573 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [135, 44, 200, 30]
2026-02-02T15:35:26.464573 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:26.464573 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 872cc81e6b70bd2301567e8e596ceac17db239b4f76165203baab174
2026-02-02T15:35:26.464573 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:26.464573 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:26.464573 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 872cc81e6b70bd2301567e8e
2026-02-02T15:35:26.464573 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 596ceac17db239b4f76165203baab174
2026-02-02T15:35:26.464573 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [135, 44, 200, 30]
2026-02-02T15:35:26.465574 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [89, 108, 234, 193]
2026-02-02T15:35:26.465574 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [89, 108, 234, 193, 125, 178, 57, 180, 247, 97, 101, 32, 59, 170, 177, 116]
2026-02-02T15:35:26.465574 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.465574 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059142886): [209, 30, 6, 24, 115, 111, 198, 202, 208, 48, 32, 79, 121, 176, 89, 189, 242, 186, 22, 223, 6, 191, 117, 175, 52, 11, 80, 60, 49, 187, 119, 146]
2026-02-02T15:35:26.465574 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:35:26.466572 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:26.466572 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:35:26.467077 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.467077 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.467077 [FINER] [YamuxStream] [3][Client] StreamID=3 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:35:26.467077 [FINER] [YamuxStream] [3][Client] StreamID=3 open() called. Current state: YamuxStreamState.init
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.458054 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:35:26.468080 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:26.468080 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:26.468080 [FINER] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Writing 30 bytes: 001cc38e22e7d57cb4f8fbe9c751f5f93a5dc4ffdd12040bcc8df0e4e3ce
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.467077 [FINE] [YamuxStream] [3][Client] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.469081 [FINEST] [TCPConnection] TCPConnection.write (id: ef43c15f-f61c-426f-8507-2a83997b8f43): Flushed 30 bytes successfully. Data preview (hex): 001cc38e22e7d57cb4f8fbe9c751f5f93a5dc4ff...
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.469081 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
2026-02-02T15:35:26.469081 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.469081 [FINE] [YamuxStream] [0][Server] StreamID=1 forceReset() called. Current state: YamuxStreamState.closing
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.469081 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:26.469081 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.469081 [FINER] [YamuxStream] [0][Server] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.reset
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.469081 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 30 bytes: 001c35e058f223a70dbce3e2e7c39e876b014f366aa5ac7db18104162d7a
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.469081 [FINER] [YamuxStream] [0][Server] StreamID=1 _cleanup() - state set to: YamuxStreamState.reset (was YamuxStreamState.reset)
2026-02-02T15:35:26.469081 [FINER] [YamuxStream] [0][Server] StreamID=1 _cleanup() closing incomingController.
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.469081 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 30 bytes successfully. Data preview (hex): 001c35e058f223a70dbce3e2e7c39e876b014f36...
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.469081 [FINE] [YamuxStream] [0][Server] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.reset
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.469081 [FINE] [SwarmConn] SwarmConn.newStream (1): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 3
2026-02-02T15:35:26.469081 [FINE] [SwarmConn] SwarmConn.newStream (1): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 3.
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.469081 [FINE] [YamuxStream] [0][Server] StreamID=1 forceReset() completed. Final state: YamuxStreamState.reset
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.470081 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068126470-6901 for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.470081 [WARNING] [Swarm] Error in acceptStream loop for conn 0 to 12D3KooWAm9napzYQt6T61prot79TYm3ckAdny8sNHtqtf989Xos: Bad state: Session closed while waiting for stream. Loop terminating.
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.470081 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:35:26.470081 [WARNING] [Swarm] Swarm.newStream: Successfully called (conn as SwarmConn).newStream() for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C. Returned Stream ID: 3, Stream protocol: Closure: () => String from Function 'protocol':.
2026-02-02T15:35:26.470081 [WARNING] [basichost] ✅ [newStream Phase 2] Stream 3 created to peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
00:57 +910 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:26.470081 [FINE] [TCPConnection] TCPConnection(ef43c15f-f61c-426f-8507-2a83997b8f43) - Connection closed.
00:57 +910 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.470081 [WARNING] [basichost] 🎯 [newStream Phase 3] Waiting for identify on stream 3...
2026-02-02T15:35:26.471080 [FINE] [identify]  [IDENTIFY-WAIT-ALREADY-SUCCEEDED] Peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C already identified on this connection, skipping
2026-02-02T15:35:26.480115 [WARNING] [identify]  [IDENTIFY-WAIT-NO-COMPLETER] No completer to await for peer=12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C (e.g., connection was closed). Identify will not complete.
2026-02-02T15:35:26.480115 [WARNING] [basichost] ✅ [newStream Phase 3] Identify complete for stream 3
2026-02-02T15:35:26.480115 [FINE] [YamuxStream] [3][Client] StreamID=3 setDeadline() set to 2026-02-02T15:35:36.480115
2026-02-02T15:35:26.480115 [WARNING] [basichost] 🎯 [newStream Phase 4] Negotiating protocols [/test/broadcast/1.0.0] on stream 3...
2026-02-02T15:35:26.480115 [FINE] [YamuxStream] [3][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:35:26.480619 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:26.480619 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
2026-02-02T15:35:26.480619 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:26.480619 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:26.480619 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 50 bytes: 003012ec887c66172eece70ce007c0d67c7b966e0c1e3338ca73db56750ec6320e074d9370d22a449b27d0aefe8d6d6dac75
2026-02-02T15:35:26.480619 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.480619 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.481623 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.481623 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.481623 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.481623 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.481623 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.481623 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.481623 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.481623 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(090b2a74) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:26.481623 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(090b2a74) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:26.482622 [FINEST] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c6fea8289c6368ea22f6256147986162a6ef97061b7334e8cb4c1f5d3
2026-02-02T15:35:26.482622 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.482622 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.482622 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.482622 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.482622 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.482622 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.482622 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.482622 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.482622 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.483622 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(a6db50fe) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:26.483622 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(a6db50fe) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 6fea8289c6368ea22f6256147986162a6ef97061b7334e8cb4c1f5d3
2026-02-02T15:35:26.483622 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:26.483622 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.483622 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:26.483622 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:26.483622 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:26.483622 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:26.483622 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:26.483622 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(a80626ed) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:26.483622 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(a80626ed) END (from buffer). Returning 28 bytes: 6fea8289c6368ea22f6256147986162a6ef97061b7334e8cb4c1f5d3. Buffer after: 0 bytes: 
2026-02-02T15:35:26.484622 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [111, 234, 130, 137]
2026-02-02T15:35:26.485621 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:26.485621 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 6fea8289c6368ea22f6256147986162a6ef97061b7334e8cb4c1f5d3
2026-02-02T15:35:26.485621 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:26.485621 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:26.485621 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 6fea8289c6368ea22f625614
2026-02-02T15:35:26.485621 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 7986162a6ef97061b7334e8cb4c1f5d3
2026-02-02T15:35:26.485621 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [111, 234, 130, 137]
2026-02-02T15:35:26.485621 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [121, 134, 22, 42]
2026-02-02T15:35:26.485621 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [121, 134, 22, 42, 110, 249, 112, 97, 183, 51, 78, 140, 180, 193, 245, 211]
2026-02-02T15:35:26.485621 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.485621 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059142886): [209, 30, 6, 24, 115, 111, 198, 202, 208, 48, 32, 79, 121, 176, 89, 189, 242, 186, 22, 223, 6, 191, 117, 175, 52, 11, 80, 60, 49, 187, 119, 146]
2026-02-02T15:35:26.485621 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 12 bytes
2026-02-02T15:35:26.485621 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:26.485621 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:35:26.487126 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.493162 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.493162 [FINER] [YamuxStream] [3][Client] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:35:26.494160 [FINEST] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - RAW_SOCKET_DATA_CHUNK_RECV (80 bytes): 001c35e058f223a70dbce3e2e7c39e876b014f366aa5ac7db18104162d7a003012ec887c66172eece70ce007c0d67c7b966e0c1e3338ca73db56750ec6320e074d9370d22a449b27d0aefe8d6d6dac75
2026-02-02T15:35:26.494613 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(090b2a74) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:26.494613 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(090b2a74) END (from buffer). Returning 2 bytes: 001c. Buffer after: 78 bytes: 35e058f223a70dbce3e2e7c39e876b014f366aa5ac7db18104162d7a003012ec887c66172eece70ce007c0d67c7b966e0c1e3338ca73db56750ec6320e074d9370d22a449b27d0aefe8d6d6dac75
2026-02-02T15:35:26.494613 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:26.494613 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.494613 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:26.494613 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:26.494613 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:26.494613 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:26.496122 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:26.496122 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(eb122e1d) START. Requested: 28. Buffer: 78 bytes.
2026-02-02T15:35:26.497638 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(eb122e1d) END (from buffer). Returning 28 bytes: 35e058f223a70dbce3e2e7c39e876b014f366aa5ac7db18104162d7a. Buffer after: 50 bytes: 003012ec887c66172eece70ce007c0d67c7b966e0c1e3338ca73db56750ec6320e074d9370d22a449b27d0aefe8d6d6dac75
2026-02-02T15:35:26.497638 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [53, 224, 88, 242]
2026-02-02T15:35:26.497638 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:26.498161 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 35e058f223a70dbce3e2e7c39e876b014f366aa5ac7db18104162d7a
2026-02-02T15:35:26.498161 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:26.498161 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:26.498161 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 35e058f223a70dbce3e2e7c3
2026-02-02T15:35:26.498161 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 9e876b014f366aa5ac7db18104162d7a
2026-02-02T15:35:26.498161 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [53, 224, 88, 242]
2026-02-02T15:35:26.498161 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [158, 135, 107, 1]
2026-02-02T15:35:26.498161 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [158, 135, 107, 1, 79, 54, 106, 165, 172, 125, 177, 129, 4, 22, 45, 122]
2026-02-02T15:35:26.498161 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.498161 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057500832): [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
2026-02-02T15:35:26.499200 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:35:26.499200 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:26.499200 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:35:26.499200 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.499200 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.499200 [FINER] [YamuxStream] [2][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:35:26.499200 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 50 bytes successfully. Data preview (hex): 003012ec887c66172eece70ce007c0d67c7b966e...
2026-02-02T15:35:26.499200 [FINE] [YamuxStream] [3][Client] StreamID=3 Direct write: Successfully wrote all 20 bytes in 18ms
2026-02-02T15:35:26.499200 [FINEST] [YamuxStream] [3][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:26.501716 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.501716 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.501716 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.501716 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.501716 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.501716 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.501716 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.502221 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.502221 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.502221 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(71086065) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:26.502221 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(71086065) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:26.502726 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.502726 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.502726 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.502726 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.502726 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.502726 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.502726 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.502726 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.502726 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.502726 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(a31f33df) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:35:26.502726 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(a31f33df) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 12ec887c66172eece70ce007c0d67c7b966e0c1e3338ca73db56750ec6320e074d9370d22a449b27d0aefe8d6d6dac75
2026-02-02T15:35:26.502726 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:26.502726 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.503737 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:26.503737 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:26.503737 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:26.503737 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:26.503737 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:26.503737 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(1e685efa) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:26.503737 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(1e685efa) END (from buffer). Returning 48 bytes: 12ec887c66172eece70ce007c0d67c7b966e0c1e3338ca73db56750ec6320e074d9370d22a449b27d0aefe8d6d6dac75. Buffer after: 0 bytes: 
2026-02-02T15:35:26.504242 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [18, 236, 136, 124]
2026-02-02T15:35:26.504242 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:26.504242 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 12ec887c66172eece70ce007c0d67c7b966e0c1e3338ca73db56750ec6320e074d9370d22a449b27d0aefe8d6d6dac75
2026-02-02T15:35:26.504242 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:26.504242 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:26.505299 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 12ec887c66172eece70ce007c0d67c7b966e0c1e3338ca73db56750ec6320e07
2026-02-02T15:35:26.505299 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 4d9370d22a449b27d0aefe8d6d6dac75
2026-02-02T15:35:26.505299 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [18, 236, 136, 124]
2026-02-02T15:35:26.505817 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [77, 147, 112, 210]
2026-02-02T15:35:26.505817 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [77, 147, 112, 210, 42, 68, 155, 39, 208, 174, 254, 141, 109, 109, 172, 117]
2026-02-02T15:35:26.505817 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.505817 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057500832): [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
2026-02-02T15:35:26.505817 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 32 bytes
2026-02-02T15:35:26.505817 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:26.505817 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:35:26.505817 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.505817 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.505817 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:26.505817 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.505817 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.505817 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.505817 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:26.505817 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:26.505817 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:26.505817 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:26.505817 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.505817 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:26.507335 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:26.507335 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:26.507335 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:26.507335 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:26.507335 [FINE] [YamuxStream] [2][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:35:26.507335 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:26.507335 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:35:26.507856 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:26.507856 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:26.507856 [FINER] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Writing 50 bytes: 0030cc7859b5c7672f3e204ec730e3a42df30ff49327b0c72d21d853b1467f91762cf00d1507e059071bf62e52cf53a78eab
2026-02-02T15:35:26.507856 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.507856 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.507856 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.507856 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.508940 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.508940 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.508940 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.508940 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.508940 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.508940 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(95d48c3c) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:26.508940 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(95d48c3c) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:26.508940 [FINEST] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030cc7859b5c7672f3e204ec730e3a42df30ff49327b0c72d21d853b1467f91762cf00d1507e059071bf62e52cf53a78eab
2026-02-02T15:35:26.508940 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(71086065) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:26.508940 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(71086065) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: cc7859b5c7672f3e204ec730e3a42df30ff49327b0c72d21d853b1467f91762cf00d1507e059071bf62e52cf53a78eab
2026-02-02T15:35:26.508940 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:26.508940 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.508940 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:26.508940 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:26.508940 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:26.509977 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:26.509977 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:26.509977 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(c9f6d5d7) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:26.509977 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(c9f6d5d7) END (from buffer). Returning 48 bytes: cc7859b5c7672f3e204ec730e3a42df30ff49327b0c72d21d853b1467f91762cf00d1507e059071bf62e52cf53a78eab. Buffer after: 0 bytes: 
2026-02-02T15:35:26.509977 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [204, 120, 89, 181]
2026-02-02T15:35:26.509977 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:26.509977 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: cc7859b5c7672f3e204ec730e3a42df30ff49327b0c72d21d853b1467f91762cf00d1507e059071bf62e52cf53a78eab
2026-02-02T15:35:26.509977 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:26.509977 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:26.509977 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: cc7859b5c7672f3e204ec730e3a42df30ff49327b0c72d21d853b1467f91762c
2026-02-02T15:35:26.509977 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: f00d1507e059071bf62e52cf53a78eab
2026-02-02T15:35:26.509977 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [204, 120, 89, 181]
2026-02-02T15:35:26.510973 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [240, 13, 21, 7]
2026-02-02T15:35:26.510973 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [240, 13, 21, 7, 224, 89, 7, 27, 246, 46, 82, 207, 83, 167, 142, 171]
2026-02-02T15:35:26.510973 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.510973 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059142886): [209, 30, 6, 24, 115, 111, 198, 202, 208, 48, 32, 79, 121, 176, 89, 189, 242, 186, 22, 223, 6, 191, 117, 175, 52, 11, 80, 60, 49, 187, 119, 146]
2026-02-02T15:35:26.511478 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 32 bytes
2026-02-02T15:35:26.511478 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:26.511478 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:35:26.511478 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.511478 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.511478 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:26.511478 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.511478 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.511478 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.511478 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:26.511478 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:26.511478 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:26.511478 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:26.511478 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.511478 [FINE] [YamuxStream] [3][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:26.512982 [FINE] [YamuxStream] [3][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:26.512982 [FINE] [YamuxStream] [3][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:26.513312 [FINE] [YamuxStream] [3][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 23 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:35:26.513312 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 35, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 23, 22, 47, 116, 101, 115, 116, 47, 98])
2026-02-02T15:35:26.513312 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:35:26.513312 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 51 bytes (plaintext was 35)
2026-02-02T15:35:26.513312 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 53
2026-02-02T15:35:26.513312 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 53 bytes: 0033ad0ef8f7d516b7d9b73870e54666e4c51496870a66866bf296a6b0319fccf917ab9fca8dae45cd873dbd4b6a5da56d2965e621
2026-02-02T15:35:26.514820 [FINEST] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Flushed 50 bytes successfully. Data preview (hex): 0030cc7859b5c7672f3e204ec730e3a42df30ff4...
2026-02-02T15:35:26.514820 [FINE] [YamuxStream] [2][Server] StreamID=3 Direct write: Successfully wrote all 20 bytes in 7ms
2026-02-02T15:35:26.514820 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:26.514820 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:26.514820 [FINEST] [YamuxStream] [2][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:26.514820 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.514820 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.514820 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.514820 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.514820 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.514820 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.514820 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.514820 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.514820 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.515976 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(cbe3d07f) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:26.515976 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(cbe3d07f) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:26.515976 [FINEST] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - RAW_SOCKET_DATA_CHUNK_RECV (53 bytes): 0033ad0ef8f7d516b7d9b73870e54666e4c51496870a66866bf296a6b0319fccf917ab9fca8dae45cd873dbd4b6a5da56d2965e621
2026-02-02T15:35:26.515976 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(95d48c3c) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:26.515976 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(95d48c3c) END (from buffer). Returning 2 bytes: 0033. Buffer after: 51 bytes: ad0ef8f7d516b7d9b73870e54666e4c51496870a66866bf296a6b0319fccf917ab9fca8dae45cd873dbd4b6a5da56d2965e621
2026-02-02T15:35:26.515976 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 51]
2026-02-02T15:35:26.515976 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.515976 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 51]
2026-02-02T15:35:26.515976 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0033
2026-02-02T15:35:26.515976 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 51
2026-02-02T15:35:26.515976 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 51
2026-02-02T15:35:26.515976 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 51 more bytes (have 0/51)
2026-02-02T15:35:26.515976 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(3a20706c) START. Requested: 51. Buffer: 51 bytes.
2026-02-02T15:35:26.515976 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(3a20706c) END (from buffer). Returning 51 bytes: ad0ef8f7d516b7d9b73870e54666e4c51496870a66866bf296a6b0319fccf917ab9fca8dae45cd873dbd4b6a5da56d2965e621. Buffer after: 0 bytes: 
2026-02-02T15:35:26.515976 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 51 bytes. First 4 bytes: [173, 14, 248, 247]
2026-02-02T15:35:26.515976 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 51, Got: 51
2026-02-02T15:35:26.515976 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 51, Bytes: ad0ef8f7d516b7d9b73870e54666e4c51496870a66866bf296a6b0319fccf917ab9fca8dae45cd873dbd4b6a5da56d2965e621
2026-02-02T15:35:26.515976 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 51
2026-02-02T15:35:26.517180 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(35) and MAC(16)
2026-02-02T15:35:26.517180 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: ad0ef8f7d516b7d9b73870e54666e4c51496870a66866bf296a6b0319fccf917ab9fca
2026-02-02T15:35:26.517180 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 8dae45cd873dbd4b6a5da56d2965e621
2026-02-02T15:35:26.517180 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [173, 14, 248, 247]
2026-02-02T15:35:26.517180 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [141, 174, 69, 205]
2026-02-02T15:35:26.517180 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [141, 174, 69, 205, 135, 61, 189, 75, 106, 93, 165, 109, 41, 101, 230, 33]
2026-02-02T15:35:26.517180 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.517180 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057500832): [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
2026-02-02T15:35:26.517180 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 35 bytes
2026-02-02T15:35:26.517180 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 35 bytes to _decryptedBuffer. New _decryptedBuffer.length: 35
2026-02-02T15:35:26.517180 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 23. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 23]
2026-02-02T15:35:26.517180 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.517180 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.517180 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=23
2026-02-02T15:35:26.517180 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.517180 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.517180 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.517180 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=23
2026-02-02T15:35:26.518236 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 23, _decryptedBuffer.length: 23
2026-02-02T15:35:26.518236 [FINER] [SecuredConnection] SecuredConnection.read (length=23): Returning 23 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [22, 47, 116, 101, 115, 116, 47, 98, 114, 111, 97, 100, 99, 97, 115, 116, 47, 49, 46, 48]
2026-02-02T15:35:26.518236 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=23
2026-02-02T15:35:26.518236 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.518236 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 23, flags: 0
2026-02-02T15:35:26.518236 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 23 bytes directly to waiting reader
2026-02-02T15:35:26.518236 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 43
2026-02-02T15:35:26.518236 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/test/broadcast/1.0.0"
2026-02-02T15:35:26.518236 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/test/broadcast/1.0.0"
2026-02-02T15:35:26.518236 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/test/broadcast/1.0.0". Sending acknowledgment: "/test/broadcast/1.0.0".
2026-02-02T15:35:26.518236 [FINE] [YamuxStream] [2][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 23 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:35:26.518236 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 35, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 23, 22, 47, 116, 101, 115, 116, 47, 98])
2026-02-02T15:35:26.519247 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
2026-02-02T15:35:26.519247 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 51 bytes (plaintext was 35)
2026-02-02T15:35:26.519247 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 53
2026-02-02T15:35:26.519247 [FINER] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Writing 53 bytes: 00337de0800cc55e9717a16770f0bfd1e3e21c1d85232f2a2f02ac03daefd916e8a7705b0f0e93d55472b4435a4cb0aa980da81098
2026-02-02T15:35:26.519247 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 53 bytes successfully. Data preview (hex): 0033ad0ef8f7d516b7d9b73870e54666e4c51496...
2026-02-02T15:35:26.519247 [FINE] [YamuxStream] [3][Client] StreamID=3 Direct write: Successfully wrote all 23 bytes in 5ms
2026-02-02T15:35:26.519247 [FINEST] [YamuxStream] [3][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:26.519247 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.520291 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.520291 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.520291 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.520291 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.520291 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.520291 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.520291 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.520291 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.520291 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(5e58064a) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:26.520291 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(5e58064a) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:26.520291 [FINEST] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - RAW_SOCKET_DATA_CHUNK_RECV (53 bytes): 00337de0800cc55e9717a16770f0bfd1e3e21c1d85232f2a2f02ac03daefd916e8a7705b0f0e93d55472b4435a4cb0aa980da81098
2026-02-02T15:35:26.520291 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(cbe3d07f) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:26.520291 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(cbe3d07f) END (from buffer). Returning 2 bytes: 0033. Buffer after: 51 bytes: 7de0800cc55e9717a16770f0bfd1e3e21c1d85232f2a2f02ac03daefd916e8a7705b0f0e93d55472b4435a4cb0aa980da81098
2026-02-02T15:35:26.520291 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 51]
2026-02-02T15:35:26.520291 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.520291 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 51]
2026-02-02T15:35:26.520291 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0033
2026-02-02T15:35:26.520291 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 51
2026-02-02T15:35:26.520291 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 51
2026-02-02T15:35:26.520291 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 51 more bytes (have 0/51)
2026-02-02T15:35:26.520291 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(0438149b) START. Requested: 51. Buffer: 51 bytes.
2026-02-02T15:35:26.520291 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(0438149b) END (from buffer). Returning 51 bytes: 7de0800cc55e9717a16770f0bfd1e3e21c1d85232f2a2f02ac03daefd916e8a7705b0f0e93d55472b4435a4cb0aa980da81098. Buffer after: 0 bytes: 
2026-02-02T15:35:26.520291 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 51 bytes. First 4 bytes: [125, 224, 128, 12]
2026-02-02T15:35:26.520291 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 51, Got: 51
2026-02-02T15:35:26.521786 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 51, Bytes: 7de0800cc55e9717a16770f0bfd1e3e21c1d85232f2a2f02ac03daefd916e8a7705b0f0e93d55472b4435a4cb0aa980da81098
2026-02-02T15:35:26.521786 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 51
2026-02-02T15:35:26.521786 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(35) and MAC(16)
2026-02-02T15:35:26.521786 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 7de0800cc55e9717a16770f0bfd1e3e21c1d85232f2a2f02ac03daefd916e8a7705b0f
2026-02-02T15:35:26.521786 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 0e93d55472b4435a4cb0aa980da81098
2026-02-02T15:35:26.521786 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [125, 224, 128, 12]
2026-02-02T15:35:26.521786 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [14, 147, 213, 84]
2026-02-02T15:35:26.523804 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [14, 147, 213, 84, 114, 180, 67, 90, 76, 176, 170, 152, 13, 168, 16, 152]
2026-02-02T15:35:26.524321 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=11 ([0, 0, 0, 0, 11, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.524321 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059142886): [209, 30, 6, 24, 115, 111, 198, 202, 208, 48, 32, 79, 121, 176, 89, 189, 242, 186, 22, 223, 6, 191, 117, 175, 52, 11, 80, 60, 49, 187, 119, 146]
2026-02-02T15:35:26.524321 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=11, got 35 bytes
2026-02-02T15:35:26.524321 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 35 bytes to _decryptedBuffer. New _decryptedBuffer.length: 35
2026-02-02T15:35:26.524321 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 23. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 23]
2026-02-02T15:35:26.524321 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.524321 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.524321 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=23
2026-02-02T15:35:26.525324 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.525324 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.525324 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.525324 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=23
2026-02-02T15:35:26.525324 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 23, _decryptedBuffer.length: 23
2026-02-02T15:35:26.525830 [FINER] [SecuredConnection] SecuredConnection.read (length=23): Returning 23 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [22, 47, 116, 101, 115, 116, 47, 98, 114, 111, 97, 100, 99, 97, 115, 116, 47, 49, 46, 48]
2026-02-02T15:35:26.525830 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=23
2026-02-02T15:35:26.525830 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.525830 [FINE] [YamuxStream] [3][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 23, flags: 0
2026-02-02T15:35:26.525830 [FINE] [YamuxStream] [3][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 23 bytes directly to waiting reader
2026-02-02T15:35:26.525830 [FINE] [YamuxStream] [3][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 43
2026-02-02T15:35:26.525830 [WARNING] [basichost] ✅ [newStream Phase 4] Protocol negotiated: /test/broadcast/1.0.0 on stream 3
2026-02-02T15:35:26.526836 [FINE] [YamuxStream] [3][Client] StreamID=3 setDeadline() cleared (set to null)
2026-02-02T15:35:26.526836 [WARNING] [basichost] 🎯 [newStream Phase 5] Setting up protocol /test/broadcast/1.0.0 on stream 3...
2026-02-02T15:35:26.526836 [FINE] [StreamScopeImpl] stream-1770068126470-6901: Setting protocol to /test/broadcast/1.0.0 for peer 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:26.526836 [FINE] [StreamScopeImpl] stream-1770068126470-6901: Successfully set protocol to /test/broadcast/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:26.526836 [WARNING] [basichost] ✅ [newStream Phase 5] Protocol setup complete for stream 3
2026-02-02T15:35:26.526836 [WARNING] [basichost] ✅ [newStream] COMPLETE - Returning stream 3 with protocol /test/broadcast/1.0.0
2026-02-02T15:35:26.526836 [FINE] [YamuxStream] [3][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 3 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524245
2026-02-02T15:35:26.526836 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 15, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 3, 2, 104, 105])
2026-02-02T15:35:26.526836 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
2026-02-02T15:35:26.527835 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 31 bytes (plaintext was 15)
2026-02-02T15:35:26.527835 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 33
2026-02-02T15:35:26.527835 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 33 bytes: 001f1dc52ba246d45a29c3faa2891799fec28b41f3904c60410f894f3771290237
2026-02-02T15:35:26.527835 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 33 bytes successfully. Data preview (hex): 001f1dc52ba246d45a29c3faa2891799fec28b41...
2026-02-02T15:35:26.531889 [FINE] [YamuxStream] [3][Client] StreamID=3 Direct write: Successfully wrote all 3 bytes in 5ms
2026-02-02T15:35:26.531889 [FINE] [SwarmStream] Closing stream 3
2026-02-02T15:35:26.531889 [FINE] [YamuxStream] [3][Client] StreamID=3 close() called. Current state: YamuxStreamState.open
2026-02-02T15:35:26.531889 [FINER] [YamuxStream] [3][Client] StreamID=3 Sending pending WINDOW_UPDATE for 43 consumed bytes before local FIN.
2026-02-02T15:35:26.531889 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 0, 0, 43])
2026-02-02T15:35:26.531889 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=12
2026-02-02T15:35:26.532888 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:26.532888 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:26.532888 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 30 bytes: 001c50a34a534893f0342fe6bbc501fe4aacb58724b787c169ace7f7f748
2026-02-02T15:35:26.532888 [FINEST] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Flushed 53 bytes successfully. Data preview (hex): 00337de0800cc55e9717a16770f0bfd1e3e21c1d...
2026-02-02T15:35:26.532888 [FINE] [YamuxStream] [2][Server] StreamID=3 Direct write: Successfully wrote all 23 bytes in 14ms
2026-02-02T15:35:26.532888 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/test/broadcast/1.0.0".
2026-02-02T15:35:26.532888 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/test/broadcast/1.0.0" and its handler.
2026-02-02T15:35:26.532888 [FINE] [multistream] [multistreamMuxer - handle] Protocol /test/broadcast/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:26.533890 [FINE] [StreamScopeImpl] stream-1770068126436-6523: Setting protocol to /test/broadcast/1.0.0 for peer 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:26.533890 [FINE] [ResourceManagerImpl] Creating new protocol scope: /test/broadcast/1.0.0
2026-02-02T15:35:26.533890 [FINE] [StreamScopeImpl] stream-1770068126436-6523: Successfully set protocol to /test/broadcast/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:26.533890 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /test/broadcast/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:35:26.533890 [FINEST] [YamuxStream] [2][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:26.533890 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.533890 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.533890 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.534888 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.534888 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.534888 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.534888 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.534888 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.534888 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.535886 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(633d152d) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:26.535886 [FINER] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Read(633d152d) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:26.535886 [FINEST] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - RAW_SOCKET_DATA_CHUNK_RECV (63 bytes): 001f1dc52ba246d45a29c3faa2891799fec28b41f3904c60410f894f3771290237001c50a34a534893f0342fe6bbc501fe4aacb58724b787c169ace7f7f748
2026-02-02T15:35:26.536886 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(5e58064a) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:26.536886 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(5e58064a) END (from buffer). Returning 2 bytes: 001f. Buffer after: 61 bytes: 1dc52ba246d45a29c3faa2891799fec28b41f3904c60410f894f3771290237001c50a34a534893f0342fe6bbc501fe4aacb58724b787c169ace7f7f748
2026-02-02T15:35:26.536886 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 31]
2026-02-02T15:35:26.536886 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.536886 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 31]
2026-02-02T15:35:26.536886 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001f
2026-02-02T15:35:26.536886 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 31
2026-02-02T15:35:26.536886 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 31
2026-02-02T15:35:26.536886 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 31 more bytes (have 0/31)
2026-02-02T15:35:26.536886 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(6c303674) START. Requested: 31. Buffer: 61 bytes.
2026-02-02T15:35:26.536886 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(6c303674) END (from buffer). Returning 31 bytes: 1dc52ba246d45a29c3faa2891799fec28b41f3904c60410f894f3771290237. Buffer after: 30 bytes: 001c50a34a534893f0342fe6bbc501fe4aacb58724b787c169ace7f7f748
2026-02-02T15:35:26.536886 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 31 bytes. First 4 bytes: [29, 197, 43, 162]
2026-02-02T15:35:26.536886 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 31, Got: 31
2026-02-02T15:35:26.537886 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 31, Bytes: 1dc52ba246d45a29c3faa2891799fec28b41f3904c60410f894f3771290237
2026-02-02T15:35:26.537886 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 31
2026-02-02T15:35:26.537886 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(15) and MAC(16)
2026-02-02T15:35:26.537886 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 1dc52ba246d45a29c3faa2891799fe
2026-02-02T15:35:26.537886 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: c28b41f3904c60410f894f3771290237
2026-02-02T15:35:26.537886 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [29, 197, 43, 162]
2026-02-02T15:35:26.538885 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [194, 139, 65, 243]
2026-02-02T15:35:26.538885 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [194, 139, 65, 243, 144, 76, 96, 65, 15, 137, 79, 55, 113, 41, 2, 55]
2026-02-02T15:35:26.539390 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=11 ([0, 0, 0, 0, 11, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.539390 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057500832): [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
2026-02-02T15:35:26.541395 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=11, got 15 bytes
2026-02-02T15:35:26.541395 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 15 bytes to _decryptedBuffer. New _decryptedBuffer.length: 15
2026-02-02T15:35:26.542394 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 3. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 3]
2026-02-02T15:35:26.542394 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.542394 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.542394 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=3
2026-02-02T15:35:26.542394 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.543393 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.543393 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.543393 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=3
2026-02-02T15:35:26.543393 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 3, _decryptedBuffer.length: 3
2026-02-02T15:35:26.543393 [FINER] [SecuredConnection] SecuredConnection.read (length=3): Returning 3 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [2, 104, 105]
2026-02-02T15:35:26.543393 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=3
2026-02-02T15:35:26.543393 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.543393 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 3, flags: 0
2026-02-02T15:35:26.543393 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 3 bytes directly to waiting reader
2026-02-02T15:35:26.543393 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 46
2026-02-02T15:35:26.543393 [FINEST] [YamuxStream] [2][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:26.543393 [FINEST] [YamuxStream] [2][Server] StreamID=3 read() returning 2 bytes from queue.
2026-02-02T15:35:26.544393 [FINEST] [YamuxStream] [2][Server] StreamID=3 read() requested maxLength 1, data is 2. Returning partial and re-queuing 1 bytes.
2026-02-02T15:35:26.544393 [FINEST] [YamuxStream] [2][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:26.544393 [FINEST] [YamuxStream] [2][Server] StreamID=3 read() returning 1 bytes from queue.
2026-02-02T15:35:26.544393 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 30 bytes successfully. Data preview (hex): 001c50a34a534893f0342fe6bbc501fe4aacb587...
2026-02-02T15:35:26.544393 [FINER] [YamuxStream] [3][Client] StreamID=3 Sending FIN frame (DATA frame with FIN flag) for local close().
2026-02-02T15:35:26.544393 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:35:26.545392 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=13
2026-02-02T15:35:26.545392 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:26.545392 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:26.545392 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 30 bytes: 001c411a015a3b065998d9bbc19246eb96030ed567fb2a95b372556ceabc
2026-02-02T15:35:26.545392 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 30 bytes successfully. Data preview (hex): 001c411a015a3b065998d9bbc19246eb96030ed5...
2026-02-02T15:35:26.545392 [FINER] [YamuxStream] [3][Client] StreamID=3 close() ensuring cleanup. State before final cleanup: YamuxStreamState.closed (was YamuxStreamState.open).
2026-02-02T15:35:26.545392 [FINER] [YamuxStream] [3][Client] StreamID=3 _cleanup() called. State before cleanup: YamuxStreamState.closed
2026-02-02T15:35:26.545392 [FINER] [YamuxStream] [3][Client] StreamID=3 _cleanup() - state set to: YamuxStreamState.closed (was YamuxStreamState.closed)
2026-02-02T15:35:26.546392 [FINER] [YamuxStream] [3][Client] StreamID=3 _cleanup() closing incomingController.
2026-02-02T15:35:26.546392 [FINE] [YamuxStream] [3][Client] StreamID=3 _cleanup() finished. Final state: YamuxStreamState.closed
2026-02-02T15:35:26.546392 [FINE] [YamuxStream] [3][Client] StreamID=3 close() completed. Final state: YamuxStreamState.closed
2026-02-02T15:35:26.546392 [FINE] [SwarmStream] Stream 3: Cleaning up management scope
2026-02-02T15:35:26.546392 [FINE] [SwarmStream] Stream 3 closed
2026-02-02T15:35:26.546392 [FINE] [Libp2pRouter] [VERBOSE] Message sent successfully to 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:26.546392 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:26.546392 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:26.546392 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:26.546392 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:26.547393 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:26.547393 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:26.547393 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:26.547393 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:26.547393 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:26.547393 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:26.547393 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:26.547393 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:26.547393 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:26.547393 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:35:26.547393 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:26.547393 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:35:26.547393 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:26.547393 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
00:57 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should send and receive messages
00:57 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:26.548392 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:26.548392 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:26.548392 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:26.555899 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:26.559898 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:26.560402 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:26.560402 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:26.560402 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:26.560402 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:26.560402 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:26.560402 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:26.560402 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:26.560402 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:35:26.560402 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:35:26.560402 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:35:26.561405 [FINEST] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c411a015a3b065998d9bbc19246eb96030ed567fb2a95b372556ceabc
2026-02-02T15:35:26.562406 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.577525 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.579525 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.579525 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.583524 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.584523 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.585523 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.585523 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.585523 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.586028 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(cfbf3cd4) START. Requested: 2. Buffer: 60 bytes.
2026-02-02T15:35:26.586028 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(cfbf3cd4) END (from buffer). Returning 2 bytes: 001c. Buffer after: 58 bytes: 50a34a534893f0342fe6bbc501fe4aacb58724b787c169ace7f7f748001c411a015a3b065998d9bbc19246eb96030ed567fb2a95b372556ceabc
2026-02-02T15:35:26.586028 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:26.586028 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.586028 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:26.587031 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:26.587031 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:26.587031 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:26.587347 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:26.587347 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(62958266) START. Requested: 28. Buffer: 58 bytes.
2026-02-02T15:35:26.587347 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(62958266) END (from buffer). Returning 28 bytes: 50a34a534893f0342fe6bbc501fe4aacb58724b787c169ace7f7f748. Buffer after: 30 bytes: 001c411a015a3b065998d9bbc19246eb96030ed567fb2a95b372556ceabc
2026-02-02T15:35:26.587347 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [80, 163, 74, 83]
2026-02-02T15:35:26.588352 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:26.588352 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 50a34a534893f0342fe6bbc501fe4aacb58724b787c169ace7f7f748
2026-02-02T15:35:26.588352 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:26.588352 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:26.588352 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 50a34a534893f0342fe6bbc5
2026-02-02T15:35:26.588352 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 01fe4aacb58724b787c169ace7f7f748
2026-02-02T15:35:26.589859 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [80, 163, 74, 83]
2026-02-02T15:35:26.589859 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [1, 254, 74, 172]
2026-02-02T15:35:26.589859 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [1, 254, 74, 172, 181, 135, 36, 183, 135, 193, 105, 172, 231, 247, 247, 72]
2026-02-02T15:35:26.589859 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=12 ([0, 0, 0, 0, 12, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.589859 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057500832): [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
2026-02-02T15:35:26.590865 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=12, got 12 bytes
2026-02-02T15:35:26.591370 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:26.591370 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 0, 0, 43]
2026-02-02T15:35:26.591370 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.591875 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.591875 [FINER] [YamuxStream] [2][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 43. Current our send window: 524245, New: 524288
2026-02-02T15:35:26.598921 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.598921 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.598921 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.598921 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.598921 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.598921 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.598921 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.598921 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.598921 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.598921 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(492d7415) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:26.598921 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(492d7415) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 411a015a3b065998d9bbc19246eb96030ed567fb2a95b372556ceabc
2026-02-02T15:35:26.598921 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:26.599925 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:26.599925 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:26.599925 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:26.599925 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:26.599925 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:26.599925 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:26.599925 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(2fad217f) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:26.599925 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(2fad217f) END (from buffer). Returning 28 bytes: 411a015a3b065998d9bbc19246eb96030ed567fb2a95b372556ceabc. Buffer after: 0 bytes: 
2026-02-02T15:35:26.599925 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [65, 26, 1, 90]
2026-02-02T15:35:26.599925 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:26.599925 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 411a015a3b065998d9bbc19246eb96030ed567fb2a95b372556ceabc
2026-02-02T15:35:26.600925 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:26.600925 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:26.600925 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 411a015a3b065998d9bbc192
2026-02-02T15:35:26.600925 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 46eb96030ed567fb2a95b372556ceabc
2026-02-02T15:35:26.600925 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [65, 26, 1, 90]
2026-02-02T15:35:26.600925 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [70, 235, 150, 3]
2026-02-02T15:35:26.600925 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [70, 235, 150, 3, 14, 213, 103, 251, 42, 149, 179, 114, 85, 108, 234, 188]
2026-02-02T15:35:26.601934 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=13 ([0, 0, 0, 0, 13, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:26.601934 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057500832): [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
2026-02-02T15:35:26.601934 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=13, got 12 bytes
2026-02-02T15:35:26.601934 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:26.601934 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:35:26.601934 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:26.601934 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:26.601934 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:26.601934 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:35:26.602948 [FINE] [YamuxStream] [2][Server] StreamID=3 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=false, queueSize=0
2026-02-02T15:35:26.605677 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:26.605677 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:26.609050 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:26.609050 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:26.609050 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:26.610533 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:26.613536 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:26.613536 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr - Initial _network.listenAddresses: []
2026-02-02T15:35:26.614041 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr, Host hashCode: 128062637
2026-02-02T15:35:26.614041 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:26.614041 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:26.614041 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:26.614041 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:26.614041 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:26.615045 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:35:26.615045 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:26.615045 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:26.615045 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:26.615045 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:26.615045 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:26.616550 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:26.617554 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:26.617554 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:26.618059 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:26.618059 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(fc85373a) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:26.618059 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(fc85373a) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:26.683304 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
2026-02-02T15:35:26.687353 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4001 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

2026-02-02T15:35:26.688368 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4001: ServerSocket closed.
2026-02-02T15:35:26.689875 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/4001 connectionStream is done. Removing listener.
2026-02-02T15:35:26.689875 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4001 already closed.
2026-02-02T15:35:26.691386 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4001: ConnectionController closed.
2026-02-02T15:35:26.691891 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWCvHvoHoFisNZBRneWJUcuf3VPiYhkkgjcNtT3SKgk5M6
2026-02-02T15:35:26.869797 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
2026-02-02T15:35:27.096170 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
2026-02-02T15:35:27.097171 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58642 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

2026-02-02T15:35:27.098949 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58642: ServerSocket closed.
2026-02-02T15:35:27.098949 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/58642 connectionStream is done. Removing listener.
2026-02-02T15:35:27.098949 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58642 already closed.
2026-02-02T15:35:27.098949 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58642: ConnectionController closed.
2026-02-02T15:35:27.098949 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWCfrLNqa6zzqKixKtpEW3rvYyA4EAz243ubvX9nC9y9Bn
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.275659 [FINE] [Swarm] [Swarm listen] Error calling transport.listen() for /ip4/0.0.0.0/tcp/4101: Exception: Failed to bind: SocketException: Failed to create server socket (OS Error: The shared flag to bind() needs to be `true` if binding multiple times on the same (address, port) combination.), address = 0.0.0.0, port = 4101 for peer 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:27.275659 [SEVERE] [Swarm] Error listening on /ip4/0.0.0.0/tcp/4101 with transport Instance of 'TCPTransport': Exception: Failed to bind: SocketException: Failed to create server socket (OS Error: The shared flag to bind() needs to be `true` if binding multiple times on the same (address, port) combination.), address = 0.0.0.0, port = 4101
2026-02-02T15:35:27.276679 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom.
2026-02-02T15:35:27.276679 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.276679 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: []
2026-02-02T15:35:27.276679 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.276679 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: []
2026-02-02T15:35:27.276679 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.276679 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: []
2026-02-02T15:35:27.277691 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:27.277691 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.277691 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.278690 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:27.278690 [FINE] [basichost] Host has no addresses at the moment of self-record creation; record will reflect this.
2026-02-02T15:35:27.292712 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:27.293716 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.293716 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 142817735, network.listenAddresses: []
2026-02-02T15:35:27.299530 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:27.299530 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom, Host hashCode: 483988480
2026-02-02T15:35:27.299530 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.299530 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.299530 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:27.299530 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:27.299530 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:27.299530 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:27.299530 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom, Host hashCode: 483988480
2026-02-02T15:35:27.299530 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.299530 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.299530 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:27.299530 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:27.302631 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:27.302631 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:27.302631 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:27.302631 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.302631 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 142817735, network.listenAddresses: []
2026-02-02T15:35:27.302631 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.304137 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 142817735, network.listenAddresses: []
2026-02-02T15:35:27.304137 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:27.305163 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:27.305163 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom, Host hashCode: 483988480
2026-02-02T15:35:27.305668 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.305668 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.305668 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:27.305668 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:27.306177 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:27.307183 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.307691 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 142817735, network.listenAddresses: []
2026-02-02T15:35:27.307691 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:27.307691 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.307691 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 142817735, network.listenAddresses: []
2026-02-02T15:35:27.308694 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=0, protocols=5
2026-02-02T15:35:27.308694 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:27.308694 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4101 with ID: 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:27.308694 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:35:27.310693 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.314693 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
2026-02-02T15:35:27.315198 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58643 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

2026-02-02T15:35:27.315198 [FINE] [ambient_autonat_v2] Probe generation 3 cancelled (current: 4)
2026-02-02T15:35:27.315198 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4501 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.314693 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:27.315198 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:27.317203 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:35:27.317203 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:35:27.317203 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=0, protocols=6
2026-02-02T15:35:27.317203 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.318202 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58643: ServerSocket closed.
2026-02-02T15:35:27.318202 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/58643 connectionStream is done. Removing listener.
2026-02-02T15:35:27.318202 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58643 already closed.
2026-02-02T15:35:27.318202 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58643: ConnectionController closed.
2026-02-02T15:35:27.318202 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWRMqSUCWBqstNp51JZNZQMoMv7RJ8NiPisCyz5rirXqJa
2026-02-02T15:35:27.318202 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4501: ServerSocket closed.
2026-02-02T15:35:27.318202 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/4501 connectionStream is done. Removing listener.
2026-02-02T15:35:27.318202 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4501 already closed.
2026-02-02T15:35:27.319201 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4501: ConnectionController closed.
2026-02-02T15:35:27.321201 [FINE] [SwarmStream] Closing stream 1
2026-02-02T15:35:27.321201 [FINE] [YamuxStream] [1][Client] StreamID=1 close() called. Current state: YamuxStreamState.closing
2026-02-02T15:35:27.321201 [FINER] [YamuxStream] [1][Client] StreamID=1 Sending FIN frame (DATA frame with FIN flag) for local close().
2026-02-02T15:35:27.321201 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc
2026-02-02T15:35:27.322201 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:27.322201 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=14
2026-02-02T15:35:27.322201 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:27.322201 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:27.322201 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 30 bytes: 001c826921e462d1f46edbb30ef21719fff5aab36678e1357028004a9d13
2026-02-02T15:35:27.322201 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 30 bytes successfully. Data preview (hex): 001c826921e462d1f46edbb30ef21719fff5aab3...
2026-02-02T15:35:27.323202 [FINER] [YamuxStream] [1][Client] StreamID=1 close() ensuring cleanup. State before final cleanup: YamuxStreamState.closed (was YamuxStreamState.closing).
2026-02-02T15:35:27.323202 [FINER] [YamuxStream] [1][Client] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.closed
2026-02-02T15:35:27.323202 [FINER] [YamuxStream] [1][Client] StreamID=1 _cleanup() - state set to: YamuxStreamState.closed (was YamuxStreamState.closed)
2026-02-02T15:35:27.323202 [FINER] [YamuxStream] [1][Client] StreamID=1 _cleanup() closing incomingController.
2026-02-02T15:35:27.323202 [FINE] [YamuxStream] [1][Client] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.closed
2026-02-02T15:35:27.323202 [FINE] [YamuxStream] [1][Client] StreamID=1 close() completed. Final state: YamuxStreamState.closed
2026-02-02T15:35:27.323202 [FINE] [SwarmStream] Stream 1: Cleaning up management scope
2026-02-02T15:35:27.323202 [FINE] [SwarmStream] Stream 1 closed
2026-02-02T15:35:27.325201 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:27.325201 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=15
2026-02-02T15:35:27.325201 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:27.325706 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:27.325706 [FINER] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Writing 30 bytes: 001c1623349a39ef9760e75865448a05da52e48740f9bed786b4c9fb5fd0
2026-02-02T15:35:27.325706 [FINEST] [TCPConnection] TCPConnection.write (id: f7d6cf05-d808-40b6-bf77-1b5d6727d8a0): Flushed 30 bytes successfully. Data preview (hex): 001c1623349a39ef9760e75865448a05da52e487...
2026-02-02T15:35:27.326711 [FINE] [YamuxStream] [1][Client] StreamID=1 forceReset() called. Current state: YamuxStreamState.closed
2026-02-02T15:35:27.326711 [FINER] [YamuxStream] [1][Client] StreamID=1 forceReset() called but stream already closed/reset. State: YamuxStreamState.closed. Doing nothing.
2026-02-02T15:35:27.327710 [FINE] [YamuxStream] [1][Client] StreamID=3 forceReset() called. Current state: YamuxStreamState.closed
2026-02-02T15:35:27.327710 [FINER] [YamuxStream] [1][Client] StreamID=3 forceReset() called but stream already closed/reset. State: YamuxStreamState.closed. Doing nothing.
2026-02-02T15:35:27.328710 [FINE] [Swarm] AcceptStream loop for conn 0 to 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah terminated due to connection closure.
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.330708 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.333037 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Error in _readAndDecryptMessage: Bad state: Connection closed while a read was pending. Current _decryptedBuffer.length: 0
2026-02-02T15:35:27.333037 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:27.333037 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:27.333037 [FINE] [TCPConnection] TCPConnection(f7d6cf05-d808-40b6-bf77-1b5d6727d8a0) - Connection closed.
2026-02-02T15:35:27.334542 [FINE] [SwarmStream] Closing stream 1
2026-02-02T15:35:27.334542 [FINE] [YamuxStream] [3][Client] StreamID=1 close() called. Current state: YamuxStreamState.closing
2026-02-02T15:35:27.334542 [FINER] [YamuxStream] [3][Client] StreamID=1 Sending FIN frame (DATA frame with FIN flag) for local close().
2026-02-02T15:35:27.334542 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:27.334542 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=14
2026-02-02T15:35:27.334542 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:27.335557 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:27.335557 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 30 bytes: 001c08b69d62bfabcdd260030cc7a2de1840aab43bfd393e72431ab971cb
2026-02-02T15:35:27.335557 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 30 bytes successfully. Data preview (hex): 001c08b69d62bfabcdd260030cc7a2de1840aab4...
2026-02-02T15:35:27.335557 [FINER] [YamuxStream] [3][Client] StreamID=1 close() ensuring cleanup. State before final cleanup: YamuxStreamState.closed (was YamuxStreamState.closing).
2026-02-02T15:35:27.335557 [FINER] [YamuxStream] [3][Client] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.closed
2026-02-02T15:35:27.335557 [FINER] [YamuxStream] [3][Client] StreamID=1 _cleanup() - state set to: YamuxStreamState.closed (was YamuxStreamState.closed)
2026-02-02T15:35:27.335557 [FINER] [YamuxStream] [3][Client] StreamID=1 _cleanup() closing incomingController.
2026-02-02T15:35:27.335557 [FINE] [YamuxStream] [3][Client] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.closed
2026-02-02T15:35:27.335557 [FINE] [YamuxStream] [3][Client] StreamID=1 close() completed. Final state: YamuxStreamState.closed
2026-02-02T15:35:27.335557 [FINE] [SwarmStream] Stream 1: Cleaning up management scope
2026-02-02T15:35:27.336557 [FINE] [SwarmStream] Stream 1 closed
2026-02-02T15:35:27.336557 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:27.336557 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=15
2026-02-02T15:35:27.336557 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:27.336557 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:27.336557 [FINER] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Writing 30 bytes: 001ca6d8710889def00e99e22e914c5b42ed6f103d3ef277c25f435ddd20
2026-02-02T15:35:27.337557 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c826921e462d1f46edbb30ef21719fff5aab36678e1357028004a9d13
2026-02-02T15:35:27.337557 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(bbfa7e2a) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:27.337557 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(bbfa7e2a) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 826921e462d1f46edbb30ef21719fff5aab36678e1357028004a9d13
2026-02-02T15:35:27.337557 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:27.337557 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:27.337557 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:27.337557 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:27.337557 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:27.337557 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:27.338557 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:27.338557 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(bf129964) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:27.338557 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(bf129964) END (from buffer). Returning 28 bytes: 826921e462d1f46edbb30ef21719fff5aab36678e1357028004a9d13. Buffer after: 0 bytes: 
2026-02-02T15:35:27.338557 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [130, 105, 33, 228]
2026-02-02T15:35:27.338557 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:27.338557 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 826921e462d1f46edbb30ef21719fff5aab36678e1357028004a9d13
2026-02-02T15:35:27.338557 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:27.338557 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:27.338557 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 826921e462d1f46edbb30ef2
2026-02-02T15:35:27.338557 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 1719fff5aab36678e1357028004a9d13
2026-02-02T15:35:27.338557 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [130, 105, 33, 228]
2026-02-02T15:35:27.339556 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [23, 25, 255, 245]
2026-02-02T15:35:27.339556 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [23, 25, 255, 245, 170, 179, 102, 120, 225, 53, 112, 40, 0, 74, 157, 19]
2026-02-02T15:35:27.339556 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=14 ([0, 0, 0, 0, 14, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:27.339556 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064635575): [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
2026-02-02T15:35:27.339556 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=14, got 12 bytes
2026-02-02T15:35:27.339556 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:27.339556 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:27.339556 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:27.340556 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:27.340556 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:27.340556 [FINE] [YamuxStream] [0][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.353060 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:35:27.393956 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.396781 [FINEST] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c08b69d62bfabcdd260030cc7a2de1840aab43bfd393e72431ab971cb
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.396781 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.396781 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(fc85373a) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:27.396781 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(fc85373a) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 08b69d62bfabcdd260030cc7a2de1840aab43bfd393e72431ab971cb
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.396781 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.396781 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:27.396781 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:27.399293 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:27.402835 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:27.402835 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:27.402835 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:27.404339 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:27.409350 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(1212ce59) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:27.409350 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(1212ce59) END (from buffer). Returning 28 bytes: 08b69d62bfabcdd260030cc7a2de1840aab43bfd393e72431ab971cb. Buffer after: 0 bytes: 
2026-02-02T15:35:27.409350 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [8, 182, 157, 98]
2026-02-02T15:35:27.410351 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:27.410351 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 08b69d62bfabcdd260030cc7a2de1840aab43bfd393e72431ab971cb
2026-02-02T15:35:27.410351 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:27.410351 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:27.410351 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 08b69d62bfabcdd260030cc7
2026-02-02T15:35:27.410351 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: a2de1840aab43bfd393e72431ab971cb
2026-02-02T15:35:27.410351 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [8, 182, 157, 98]
2026-02-02T15:35:27.410351 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [162, 222, 24, 64]
2026-02-02T15:35:27.411351 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [162, 222, 24, 64, 170, 180, 59, 253, 57, 62, 114, 67, 26, 185, 113, 203]
2026-02-02T15:35:27.411351 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=14 ([0, 0, 0, 0, 14, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:27.411351 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057500832): [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
2026-02-02T15:35:27.411351 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=14, got 12 bytes
2026-02-02T15:35:27.415366 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.415366 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:27.416366 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.416366 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:27.416366 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.416366 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.416366 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.417365 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 99ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:70:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:27.418365 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 106ms (dial: 100ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:70:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.418365 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:27.418365 [FINE] [YamuxStream] [2][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.418365 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:27.418365 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:27.418365 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.418365 [FINEST] [TCPConnection] TCPConnection.write (id: 59329682-d8d0-48b6-873e-a410ea70a435): Flushed 30 bytes successfully. Data preview (hex): 001ca6d8710889def00e99e22e914c5b42ed6f10...
2026-02-02T15:35:27.418365 [FINE] [YamuxStream] [3][Client] StreamID=1 forceReset() called. Current state: YamuxStreamState.closed
2026-02-02T15:35:27.418365 [FINER] [YamuxStream] [3][Client] StreamID=1 forceReset() called but stream already closed/reset. State: YamuxStreamState.closed. Doing nothing.
2026-02-02T15:35:27.418365 [FINE] [YamuxStream] [3][Client] StreamID=3 forceReset() called. Current state: YamuxStreamState.closed
2026-02-02T15:35:27.418365 [FINER] [YamuxStream] [3][Client] StreamID=3 forceReset() called but stream already closed/reset. State: YamuxStreamState.closed. Doing nothing.
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.419869 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.420883 [FINE] [Swarm] AcceptStream loop for conn 1 to 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C terminated due to connection closure.
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.420883 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:35:27.420883 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.422883 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Error in _readAndDecryptMessage: Bad state: Connection closed while a read was pending. Current _decryptedBuffer.length: 0
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.422883 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.423883 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:27.423883 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:27.425386 [FINE] [TCPConnection] TCPConnection(59329682-d8d0-48b6-873e-a410ea70a435) - Connection closed.
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.425386 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:27.425386 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.426390 [FINEST] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c1623349a39ef9760e75865448a05da52e48740f9bed786b4c9fb5fd0
2026-02-02T15:35:27.427389 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:27.427389 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:27.442385 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:27.443384 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:27.443384 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:27.444384 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:27.444384 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:27.445383 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:27.446383 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:27.567786 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(fce08fba) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:27.567786 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(fce08fba) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 1623349a39ef9760e75865448a05da52e48740f9bed786b4c9fb5fd0
2026-02-02T15:35:27.567786 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:27.567786 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:27.567786 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:27.568787 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:27.568787 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:27.568787 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:27.568787 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:27.568787 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(dea25dc1) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:27.568787 [FINER] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Read(dea25dc1) END (from buffer). Returning 28 bytes: 1623349a39ef9760e75865448a05da52e48740f9bed786b4c9fb5fd0. Buffer after: 0 bytes: 
2026-02-02T15:35:27.568787 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [22, 35, 52, 154]
2026-02-02T15:35:27.568787 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:27.568787 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 1623349a39ef9760e75865448a05da52e48740f9bed786b4c9fb5fd0
2026-02-02T15:35:27.568787 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:27.568787 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:27.568787 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 1623349a39ef9760e7586544
2026-02-02T15:35:27.568787 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 8a05da52e48740f9bed786b4c9fb5fd0
2026-02-02T15:35:27.568787 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [22, 35, 52, 154]
2026-02-02T15:35:27.569786 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [138, 5, 218, 82]
2026-02-02T15:35:27.569786 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [138, 5, 218, 82, 228, 135, 64, 249, 190, 215, 134, 180, 201, 251, 95, 208]
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.568787 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.569786 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=15 ([0, 0, 0, 0, 15, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:27.569786 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1064635575): [244, 10, 3, 95, 14, 48, 87, 49, 6, 131, 55, 95, 7, 112, 235, 111, 196, 239, 12, 73, 85, 74, 113, 231, 15, 128, 115, 50, 97, 237, 188, 245]
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.569786 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.570785 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=15, got 12 bytes
2026-02-02T15:35:27.570785 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:27.570785 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]
2026-02-02T15:35:27.570785 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:27.570785 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.570785 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.571786 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:27.571786 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=12
2026-02-02T15:35:27.571786 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:27.571786 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:27.571786 [FINER] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Writing 30 bytes: 001c5b8cad5fa5f36596cb2993f62f90594cc2ed76780ca7a340f0106b66
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.573290 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 151ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:70:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:27.573290 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 153ms (dial: 153ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:70:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:27.573290 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:27.573290 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:27.573290 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:35:27.574305 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:35:27.574305 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:35:27.574305 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:35:27.575304 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:35:27.575304 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:27.575810 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.582811 [FINEST] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001ca6d8710889def00e99e22e914c5b42ed6f103d3ef277c25f435ddd20
2026-02-02T15:35:27.586315 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:27.586315 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:27.586315 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:27.586315 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:27.586315 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:27.587319 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:27.587319 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:27.587319 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:27.588318 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:27.591317 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(6a4d2aa9) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:27.591317 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(6a4d2aa9) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: a6d8710889def00e99e22e914c5b42ed6f103d3ef277c25f435ddd20
2026-02-02T15:35:27.592319 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:27.592319 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:27.592319 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:27.592319 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:27.592319 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:27.592319 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:27.592319 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:27.594317 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(68d18637) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:27.595316 [FINER] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Read(68d18637) END (from buffer). Returning 28 bytes: a6d8710889def00e99e22e914c5b42ed6f103d3ef277c25f435ddd20. Buffer after: 0 bytes: 
2026-02-02T15:35:27.595316 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [166, 216, 113, 8]
2026-02-02T15:35:27.595316 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:27.595316 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: a6d8710889def00e99e22e914c5b42ed6f103d3ef277c25f435ddd20
2026-02-02T15:35:27.595316 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:27.595316 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:27.595316 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: a6d8710889def00e99e22e91
2026-02-02T15:35:27.595316 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 4c5b42ed6f103d3ef277c25f435ddd20
2026-02-02T15:35:27.595316 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [166, 216, 113, 8]
2026-02-02T15:35:27.595316 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [76, 91, 66, 237]
2026-02-02T15:35:27.595316 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [76, 91, 66, 237, 111, 16, 61, 62, 242, 119, 194, 95, 67, 93, 221, 32]
2026-02-02T15:35:27.595316 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=15 ([0, 0, 0, 0, 15, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:27.596318 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1057500832): [31, 39, 184, 115, 47, 38, 122, 214, 93, 62, 51, 2, 28, 194, 4, 75, 147, 119, 224, 205, 246, 82, 87, 243, 195, 8, 175, 220, 117, 50, 173, 66]
2026-02-02T15:35:27.596318 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=15, got 12 bytes
2026-02-02T15:35:27.596318 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:27.596824 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]
2026-02-02T15:35:27.596824 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:27.596824 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:27.596824 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:27.596824 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=12
2026-02-02T15:35:27.597829 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:27.597829 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:27.597829 [FINER] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Writing 30 bytes: 001c99cc0aeb76c417a1b95dc6818f091789b8d5f4132bc6e3281cfa8d2a
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.665486 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
2026-02-02T15:35:27.667486 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4101 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

2026-02-02T15:35:27.668487 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:27.668487 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:27.668487 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:27.669485 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 95ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:70:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:27.670993 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 96ms (dial: 96ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:70:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:27.670993 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:27.671992 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:27.671992 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:35:27.673497 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:35:27.673497 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:35:27.674514 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:35:27.674514 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:35:27.674514 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:27.674514 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:27.681477 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:27.681477 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:27.681477 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.682477 [FINE] [basichost] Discovered 2 network interfaces
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.682477 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 8ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:70:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:27.682477 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 8ms (dial: 8ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:70:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:27.682477 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:27.682477 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:27.683476 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:27.683476 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:27.683476 [FINE] [ResourceManagerImpl] ResourceManager initialized.
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.683476 [FINER] [basichost] Processing interface: Wi-Fi
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:27.698200 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.699199 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN - Initial _network.listenAddresses: []
2026-02-02T15:35:27.701702 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN, Host hashCode: 562629793
2026-02-02T15:35:27.702706 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.704707 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.707705 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:27.708704 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN
2026-02-02T15:35:27.708704 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:27.713212 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:35:27.716210 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4101: ServerSocket closed.
2026-02-02T15:35:27.717210 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/4101 connectionStream is done. Removing listener.
2026-02-02T15:35:27.718210 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4101 already closed.
2026-02-02T15:35:27.722712 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4101: ConnectionController closed.
2026-02-02T15:35:27.723716 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWFaKmQfKo2KNHGawETZVkTc5qYohpHEf2PTGxepranAac
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:27.729713 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:27.730713 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:27.732218 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:27.732730 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:27.732730 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:27.732730 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:27.732730 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:27.732730 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:27.733741 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:35:27.735245 [INFO] [Config] [Config.newNode] for peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr: Host created. Listening will be handled by host.start().
2026-02-02T15:35:27.735245 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:27.736399 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr, network.hashCode: 36804976, initial network.listenAddresses: []
2026-02-02T15:35:27.736399 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:27.736399 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4601]. Attempting to listen via _network.listen().
2026-02-02T15:35:27.736399 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:27.736399 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4601] for peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:27.736399 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:27.737904 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4601 for peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:27.739924 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4601 with transport TCPTransport for peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:27.740933 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4601 with transport TCPTransport
2026-02-02T15:35:27.749912 [FINE] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Socket stream done.
2026-02-02T15:35:27.749912 [FINEST] [TCPConnection] TCPConnection.write (id: 4df013e4-3faa-4fc3-83c1-8939092c9a64): Flushed 30 bytes successfully. Data preview (hex): 001c5b8cad5fa5f36596cb2993f62f90594cc2ed...
2026-02-02T15:35:27.750913 [FINE] [YamuxStream] [0][Server] StreamID=1 forceReset() called. Current state: YamuxStreamState.closing
2026-02-02T15:35:27.750913 [FINER] [YamuxStream] [0][Server] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.reset
2026-02-02T15:35:27.751419 [FINER] [YamuxStream] [0][Server] StreamID=1 _cleanup() - state set to: YamuxStreamState.reset (was YamuxStreamState.reset)
2026-02-02T15:35:27.751419 [FINER] [YamuxStream] [0][Server] StreamID=1 _cleanup() closing incomingController.
2026-02-02T15:35:27.751419 [FINE] [YamuxStream] [0][Server] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.reset
2026-02-02T15:35:27.751419 [FINE] [YamuxStream] [0][Server] StreamID=1 forceReset() completed. Final state: YamuxStreamState.reset
2026-02-02T15:35:27.751419 [FINE] [YamuxStream] [0][Server] StreamID=3 forceReset() called. Current state: YamuxStreamState.closing
2026-02-02T15:35:27.751419 [FINER] [YamuxStream] [0][Server] StreamID=3 _cleanup() called. State before cleanup: YamuxStreamState.reset
2026-02-02T15:35:27.751419 [FINER] [YamuxStream] [0][Server] StreamID=3 _cleanup() - state set to: YamuxStreamState.reset (was YamuxStreamState.reset)
2026-02-02T15:35:27.751419 [FINER] [YamuxStream] [0][Server] StreamID=3 _cleanup() closing incomingController.
2026-02-02T15:35:27.751419 [FINE] [YamuxStream] [0][Server] StreamID=3 _cleanup() finished. Final state: YamuxStreamState.reset
2026-02-02T15:35:27.751419 [FINE] [YamuxStream] [0][Server] StreamID=3 forceReset() completed. Final state: YamuxStreamState.reset
2026-02-02T15:35:27.752494 [WARNING] [Swarm] Error in acceptStream loop for conn 0 to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc: Bad state: Session closed while waiting for stream. Loop terminating.
2026-02-02T15:35:27.752494 [FINE] [TCPConnection] TCPConnection(4df013e4-3faa-4fc3-83c1-8939092c9a64) - Connection closed.
2026-02-02T15:35:27.752494 [FINEST] [TCPConnection] TCPConnection.write (id: 50af3c9f-c528-4d4d-b87a-5e31802d9c77): Flushed 30 bytes successfully. Data preview (hex): 001c99cc0aeb76c417a1b95dc6818f091789b8d5...
2026-02-02T15:35:27.752494 [FINE] [YamuxStream] [2][Server] StreamID=1 forceReset() called. Current state: YamuxStreamState.closing
2026-02-02T15:35:27.752494 [FINER] [YamuxStream] [2][Server] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.reset
2026-02-02T15:35:27.752494 [FINER] [YamuxStream] [2][Server] StreamID=1 _cleanup() - state set to: YamuxStreamState.reset (was YamuxStreamState.reset)
2026-02-02T15:35:27.752494 [FINER] [YamuxStream] [2][Server] StreamID=1 _cleanup() closing incomingController.
2026-02-02T15:35:27.753998 [FINE] [YamuxStream] [2][Server] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.reset
2026-02-02T15:35:27.753998 [FINE] [YamuxStream] [2][Server] StreamID=1 forceReset() completed. Final state: YamuxStreamState.reset
2026-02-02T15:35:27.753998 [FINE] [YamuxStream] [2][Server] StreamID=3 forceReset() called. Current state: YamuxStreamState.closing
2026-02-02T15:35:27.753998 [FINER] [YamuxStream] [2][Server] StreamID=3 _cleanup() called. State before cleanup: YamuxStreamState.reset
2026-02-02T15:35:27.753998 [FINER] [YamuxStream] [2][Server] StreamID=3 _cleanup() - state set to: YamuxStreamState.reset (was YamuxStreamState.reset)
2026-02-02T15:35:27.753998 [FINER] [YamuxStream] [2][Server] StreamID=3 _cleanup() closing incomingController.
2026-02-02T15:35:27.753998 [FINE] [YamuxStream] [2][Server] StreamID=3 _cleanup() finished. Final state: YamuxStreamState.reset
2026-02-02T15:35:27.753998 [FINE] [YamuxStream] [2][Server] StreamID=3 forceReset() completed. Final state: YamuxStreamState.reset
2026-02-02T15:35:27.753998 [WARNING] [Swarm] Error in acceptStream loop for conn 0 to 12D3KooWHqr6uo2PBcBQ2c8aVURPTmdvEUcQyQM5FnnasZVKWnsc: Bad state: Session closed while waiting for stream. Loop terminating.
2026-02-02T15:35:27.755520 [FINE] [TCPConnection] TCPConnection(50af3c9f-c528-4d4d-b87a-5e31802d9c77) - Connection closed.
2026-02-02T15:35:27.756024 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
2026-02-02T15:35:27.757029 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58644 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

2026-02-02T15:35:27.794531 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58644: ServerSocket closed.
2026-02-02T15:35:27.794531 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/58644 connectionStream is done. Removing listener.
2026-02-02T15:35:27.794531 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58644 already closed.
2026-02-02T15:35:27.794531 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/58644: ConnectionController closed.
2026-02-02T15:35:27.794531 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWSaDoRU12m5s6XsoJKLZw7jT4pVku7MBdg8jbqpjc71wq
2026-02-02T15:35:28.138799 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4601. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4601 for peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:28.138799 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4601 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4601
2026-02-02T15:35:28.139798 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4601. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4601] for peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:28.139798 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.139798 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4601 for peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr. This should be resolved to concrete addresses by the host.
2026-02-02T15:35:28.139798 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:28.139798 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4601
2026-02-02T15:35:28.139798 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr.
2026-02-02T15:35:28.139798 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.140798 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.140798 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.140798 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.140798 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.140798 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.140798 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:28.140798 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.140798 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.143796 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4601 (first component not IP)
2026-02-02T15:35:28.143796 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:28.143796 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4601 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4601
2026-02-02T15:35:28.144796 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4601 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4601
2026-02-02T15:35:28.144796 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.145796 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4601 (first component not IP)
2026-02-02T15:35:28.145796 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:28.145796 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr - resolvedAddrs: {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:35:28.145796 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:35:28.145796 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:35:28.146796 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr - Returning: [/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601]
2026-02-02T15:35:28.160810 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:28.161810 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.161810 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 36804976, network.listenAddresses: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.164809 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:28.164809 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr, Host hashCode: 128062637
2026-02-02T15:35:28.165808 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.165808 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.165808 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4601 (first component not IP)
2026-02-02T15:35:28.165808 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:28.165808 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4601 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4601
2026-02-02T15:35:28.165808 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4601 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4601
2026-02-02T15:35:28.165808 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.166808 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4601 (first component not IP)
2026-02-02T15:35:28.166808 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:28.166808 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr - resolvedAddrs: {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:35:28.166808 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:35:28.167313 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:35:28.167313 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr - Returning: [/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601]
2026-02-02T15:35:28.167313 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:28.167313 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:28.167817 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:28.167817 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr, Host hashCode: 128062637
2026-02-02T15:35:28.167817 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.167817 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.167817 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4601 (first component not IP)
2026-02-02T15:35:28.167817 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:28.167817 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4601 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4601
2026-02-02T15:35:28.167817 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4601 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4601
2026-02-02T15:35:28.168829 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.168829 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4601 (first component not IP)
2026-02-02T15:35:28.168829 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:28.168829 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr - resolvedAddrs: {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:35:28.168829 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:35:28.168829 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:35:28.168829 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr - Returning: [/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601]
2026-02-02T15:35:28.168829 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:28.170828 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:28.170828 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:28.170828 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:28.170828 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.170828 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 36804976, network.listenAddresses: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.170828 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.170828 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 36804976, network.listenAddresses: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.170828 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:28.171828 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:28.171828 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr, Host hashCode: 128062637
2026-02-02T15:35:28.171828 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.171828 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.171828 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4601 (first component not IP)
2026-02-02T15:35:28.172829 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:28.172829 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4601 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4601
2026-02-02T15:35:28.176614 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4601 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4601
2026-02-02T15:35:28.177119 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.177119 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4601 (first component not IP)
2026-02-02T15:35:28.177119 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:28.177119 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr - resolvedAddrs: {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:35:28.177119 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:35:28.177119 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601}
2026-02-02T15:35:28.177119 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr - Returning: [/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601]
2026-02-02T15:35:28.178123 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4601, /ip4/172.29.112.1/tcp/4601] for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:28.178123 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:28.178635 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.178635 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 36804976, network.listenAddresses: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.178635 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:28.178635 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.178635 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 36804976, network.listenAddresses: [/ip4/0.0.0.0/tcp/4601]
2026-02-02T15:35:28.178635 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:35:28.178635 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:28.178635 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4601 with ID: 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:28.179666 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:28.180171 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:28.180171 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
00:58 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:28.181174 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:35:28.182173 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:28.182173 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:28.182173 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:28.182173 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:28.182173 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:28.182173 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:28.182173 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:28.182173 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:28.182173 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:28.183174 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:35:28.183174 [INFO] [Config] [Config.newNode] for peer 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN: Host created. Listening will be handled by host.start().
2026-02-02T15:35:28.183174 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:28.183174 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN, network.hashCode: 957101630, initial network.listenAddresses: []
2026-02-02T15:35:28.183174 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:28.183174 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4102]. Attempting to listen via _network.listen().
2026-02-02T15:35:28.183174 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:28.183174 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4102] for peer 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN
2026-02-02T15:35:28.183174 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4102]
2026-02-02T15:35:28.183174 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4102 for peer 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN
2026-02-02T15:35:28.183174 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4102 with transport TCPTransport for peer 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN
2026-02-02T15:35:28.183174 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4102 with transport TCPTransport
00:58 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:28.183174 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:28.184679 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:28.184679 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:28.184679 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:28.184679 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:28.185698 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:35:28.186698 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:28.186698 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:28.187203 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:28.189807 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:28.189807 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - Initial _network.listenAddresses: []
2026-02-02T15:35:28.190807 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2, Host hashCode: 682280892
2026-02-02T15:35:28.190807 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:28.190807 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:28.190807 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:28.190807 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:28.190807 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:28.191807 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
01:00 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:29.288621 [FINE] [Swarm] [Swarm listen] Error calling transport.listen() for /ip4/0.0.0.0/tcp/4102: Exception: Failed to bind: SocketException: Failed to create server socket (OS Error: The shared flag to bind() needs to be `true` if binding multiple times on the same (address, port) combination.), address = 0.0.0.0, port = 4102 for peer 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN
2026-02-02T15:35:29.290126 [SEVERE] [Swarm] Error listening on /ip4/0.0.0.0/tcp/4102 with transport Instance of 'TCPTransport': Exception: Failed to bind: SocketException: Failed to create server socket (OS Error: The shared flag to bind() needs to be `true` if binding multiple times on the same (address, port) combination.), address = 0.0.0.0, port = 4102
2026-02-02T15:35:29.290126 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN.
2026-02-02T15:35:29.290126 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:29.291131 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: []
2026-02-02T15:35:29.291131 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:29.291131 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: []
2026-02-02T15:35:29.291131 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:29.291131 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: []
2026-02-02T15:35:29.292130 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:29.292130 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:29.293129 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:29.293129 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:29.293129 [FINE] [basichost] Host has no addresses at the moment of self-record creation; record will reflect this.
2026-02-02T15:35:29.302126 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:29.303127 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:29.303127 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 957101630, network.listenAddresses: []
2026-02-02T15:35:29.304126 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:29.305126 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN, Host hashCode: 562629793
2026-02-02T15:35:29.305446 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:29.305446 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:29.305446 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:29.305446 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN
2026-02-02T15:35:29.306451 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:29.306451 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:29.306451 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN, Host hashCode: 562629793
2026-02-02T15:35:29.306451 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:29.307449 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:29.307449 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:29.307449 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN
2026-02-02T15:35:29.307954 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:29.308957 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:29.308957 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:29.308957 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:29.308957 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 957101630, network.listenAddresses: []
2026-02-02T15:35:29.308957 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:29.308957 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 957101630, network.listenAddresses: []
2026-02-02T15:35:29.308957 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN
2026-02-02T15:35:29.309958 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:29.309958 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN, Host hashCode: 562629793
2026-02-02T15:35:29.309958 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:29.309958 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:29.309958 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:29.309958 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN
2026-02-02T15:35:29.309958 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN
2026-02-02T15:35:29.310956 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:29.310956 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 957101630, network.listenAddresses: []
2026-02-02T15:35:29.310956 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:29.310956 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:29.310956 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 957101630, network.listenAddresses: []
2026-02-02T15:35:29.310956 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=0, protocols=5
2026-02-02T15:35:29.310956 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:29.310956 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4102 with ID: 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN
2026-02-02T15:35:29.311956 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
2026-02-02T15:35:29.311956 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:29.352746 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:29.352746 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:29.353746 [FINE] [Swarm] Swarm.dialPeer: peer=QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN, existing_conns=0
2026-02-02T15:35:29.354168 [FINE] [Swarm] Looking up connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
2026-02-02T15:35:29.354672 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=0, protocols=6
2026-02-02T15:35:29.354672 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:29.354672 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:29.354672 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN"
01:00 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:29.354672 [FINE] [basichost] Discovered 2 network interfaces
01:00 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:29.354672 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN. Dialing.
01:00 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:29.354672 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:29.356186 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:29.356186 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:29.356186 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:29.357208 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:29.357208 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:29.357208 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:29.357208 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
01:00 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:29.357208 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
01:00 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:29.357208 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:29.357208 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
01:00 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:29.357208 [FINE] [Swarm] Dialing QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
01:00 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:29.357208 [INFO] [Config] [Config.newNode] for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2: Host created. Listening will be handled by host.start().
2026-02-02T15:35:29.357208 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:29.357208 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2, network.hashCode: 246822824, initial network.listenAddresses: []
2026-02-02T15:35:29.357208 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:29.358207 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4602]. Attempting to listen via _network.listen().
2026-02-02T15:35:29.358207 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:29.358207 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4602] for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:29.358207 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4602]
01:00 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:29.358207 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
01:00 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:29.358207 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4602 for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:29.358207 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4602 with transport TCPTransport for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
01:00 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:29.358207 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN at /dnsaddr/bootstrap.libp2p.io
01:00 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:29.358207 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4602 with transport TCPTransport
01:00 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:29.359207 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:29.359207 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN after 5ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:71:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:29.359207 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 47ms (dial: 5ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:71:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:29.359207 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:29.359207 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmNnooDu7bfjPFoTZYxMNLWUQJyrVwtbZg5gBMjTezGAJN: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:29.360206 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
2026-02-02T15:35:29.360206 [FINE] [Swarm] Swarm.dialPeer: peer=QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa, existing_conns=0
2026-02-02T15:35:29.361206 [FINE] [Swarm] Looking up connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:35:29.361206 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa"
2026-02-02T15:35:29.361206 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa. Dialing.
2026-02-02T15:35:29.361206 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:29.361206 [FINE] [Swarm] Dialing QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:29.361206 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:29.361206 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:29.361206 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:29.362539 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:71:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:29.362539 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:71:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:29.362539 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:29.362539 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmQCU2EcMqAqQPR2i9bChDtGNJchTbq5TbXJJ16u19uLTa: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:29.363544 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
2026-02-02T15:35:29.364052 [FINE] [Swarm] Swarm.dialPeer: peer=QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb, existing_conns=0
2026-02-02T15:35:29.364052 [FINE] [Swarm] Looking up connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:35:29.364052 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb"
2026-02-02T15:35:29.364052 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb. Dialing.
2026-02-02T15:35:29.364557 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:29.364557 [FINE] [Swarm] Dialing QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:29.364557 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:29.364557 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:29.364557 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:29.365662 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb after 0ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:71:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:29.365662 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 1ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:71:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:29.365662 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:29.365662 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmbLHAnMoJPWSCR5Zhtx6BHJX9KiKNN6tpvbUcqanj75Nb: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:29.365662 [FINE] [Libp2pRouter] [DEBUG] Connecting to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
2026-02-02T15:35:29.366675 [FINE] [Swarm] Swarm.dialPeer: peer=QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt, existing_conns=0
2026-02-02T15:35:29.366675 [FINE] [Swarm] Looking up connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:35:29.366675 [FINE] [Swarm] Found 0 existing connections for peer ID string: "QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt"
2026-02-02T15:35:29.366675 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt. Dialing.
2026-02-02T15:35:29.366675 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:29.366675 [FINE] [Swarm] Dialing QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:29.366675 [FINE] [HappyEyeballsDialer] Attempting /dnsaddr/bootstrap.libp2p.io (priority 20)
2026-02-02T15:35:29.367671 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt at /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:29.367671 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:29.367671 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt after 2ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#4      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#5      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:71:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:29.367671 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 2ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      Libp2pRouter.connect (package:dart_ipfs/src/transport/libp2p_router.dart:247:7)
<asynchronous suspension>
#3      Libp2pRouter._connectToBootstrapPeers (package:dart_ipfs/src/transport/libp2p_router.dart:195:9)
<asynchronous suspension>
#4      Libp2pRouter.start (package:dart_ipfs/src/transport/libp2p_router.dart:185:7)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:71:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:29.367671 [SEVERE] [Libp2pRouter] [ERROR] Failed to connect to /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
Stack trace: null
2026-02-02T15:35:29.368673 [WARNING] [Libp2pRouter] [WARNING] Failed to connect to bootstrap peer /dnsaddr/bootstrap.libp2p.io/p2p/QmcZf59bWwK5XFi76CZX8cbJ4BhTzzA3gU1ZjYZcYW3dwt: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /dnsaddr/bootstrap.libp2p.io: Exception: No transport found for address: /dnsaddr/bootstrap.libp2p.io
2026-02-02T15:35:29.368673 [FINE] [Libp2pRouter] [DEBUG] Connecting to /ip4/127.0.0.1/tcp/4102/p2p/12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN
2026-02-02T15:35:29.368673 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN, existing_conns=0
2026-02-02T15:35:29.368673 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN"
2026-02-02T15:35:29.368673 [FINE] [Swarm] Found 0 existing connections for peer ID string: "12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN"
2026-02-02T15:35:29.369672 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN. Dialing.
2026-02-02T15:35:29.369672 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:29.369672 [FINE] [Swarm] Dialing 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:29.370671 [FINE] [HappyEyeballsDialer] Attempting /ip4/127.0.0.1/tcp/4102 (priority 1)
2026-02-02T15:35:29.370671 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN at /ip4/127.0.0.1/tcp/4102
2026-02-02T15:35:29.374230 [FINE] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) CREATED. IsServer: true, Direction: Direction.inbound. Socket Local: 0.0.0.0:4102, Socket Remote: 127.0.0.1:58648
2026-02-02T15:35:29.375230 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068129375-4059
2026-02-02T15:35:29.375230 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:29.375230 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(55c56937) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:29.375230 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(55c56937) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:29.380743 [FINE] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) CREATED. IsServer: false, Direction: Direction.outbound. Socket Local: 127.0.0.1:58648, Socket Remote: 127.0.0.1:4102
2026-02-02T15:35:29.380743 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068129380-539
2026-02-02T15:35:29.380743 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWGm5QSmCajvAHSytnBDxtEeL9fS7etWPPSScBUKEGeGQw
2026-02-02T15:35:29.380743 [FINER] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:29.382300 [FINEST] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:29.382300 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(55c56937) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.382300 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(55c56937) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:35:29.382300 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:29.382300 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:29.382300 [FINER] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:29.382300 [FINEST] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:35:29.382300 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(d00a3ddf) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:29.382300 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(d00a3ddf) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:29.383321 [FINEST] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:29.383321 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(d00a3ddf) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.383321 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(d00a3ddf) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:35:29.383321 [FINER] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:35:29.383321 [FINEST] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:35:29.383321 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:29.383321 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:29.383321 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(d082ae07) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:29.383321 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(d082ae07) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:29.383321 [FINEST] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:35:29.383321 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(d082ae07) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.383321 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(d082ae07) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:35:29.383321 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/noise"
2026-02-02T15:35:29.383321 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/noise"
2026-02-02T15:35:29.383321 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/noise". Sending acknowledgment: "/noise".
2026-02-02T15:35:29.384825 [FINER] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:35:29.384825 [FINEST] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:35:29.384825 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(2c636b29) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:29.385338 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(2c636b29) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:29.385338 [FINEST] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:35:29.385338 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(2c636b29) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.385338 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(2c636b29) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:35:29.387864 [INFO] [NoiseProtocol] secureOutbound: Writing msg1 (e): 32 bytes
2026-02-02T15:35:29.387864 [FINER] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Writing 34 bytes: 00209928d1707d3139af98ec2df8f4207227d10c7ecdf4e65351ba53ba1c43179800
2026-02-02T15:35:29.387864 [FINEST] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Flushed 34 bytes successfully. Data preview (hex): 00209928d1707d3139af98ec2df8f4207227d10c...
2026-02-02T15:35:29.388367 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(4c0f125f) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:29.388367 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(4c0f125f) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:29.388367 [FINEST] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:35:29.388367 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/noise".
2026-02-02T15:35:29.388367 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/noise" and its handler.
2026-02-02T15:35:29.388367 [FINE] [multistream] [multistreamMuxer - handle] Protocol /noise negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:29.388367 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /noise on stream scope and stream. Proceeding to call handler.
2026-02-02T15:35:29.391378 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(6b9789bc) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:29.391882 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(6b9789bc) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:29.391882 [FINEST] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - RAW_SOCKET_DATA_CHUNK_RECV (34 bytes): 00209928d1707d3139af98ec2df8f4207227d10c7ecdf4e65351ba53ba1c43179800
2026-02-02T15:35:29.391882 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(6b9789bc) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.391882 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(6b9789bc) END (from buffer). Returning 2 bytes: 0020. Buffer after: 32 bytes: 9928d1707d3139af98ec2df8f4207227d10c7ecdf4e65351ba53ba1c43179800
2026-02-02T15:35:29.391882 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(3caf937e) START. Requested: 32. Buffer: 32 bytes.
2026-02-02T15:35:29.391882 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(3caf937e) END (from buffer). Returning 32 bytes: 9928d1707d3139af98ec2df8f4207227d10c7ecdf4e65351ba53ba1c43179800. Buffer after: 0 bytes: 
2026-02-02T15:35:29.391882 [INFO] [NoiseProtocol] secureInbound: Read msg1 (e): 32 bytes
2026-02-02T15:35:29.399476 [INFO] [NoiseProtocol] secureInbound: Writing msg2 (e,ee,s,es + payload): 200 bytes
2026-02-02T15:35:29.399476 [FINER] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Writing 202 bytes: 00c81ab8c3bb463285e4ad0e14ba708113064f184243cda959028a113aaa176b0f0f3b6e9e2b9b93585e6857b06d19488ed0c8de07071eaec59d788efc92beee2999ce7dcd30d4bfae70263870a47b19161dfdf75ca7d4e4cbcd18851df0c328e41342646161d27c961c18c248de324769071b67beb9374ce914deef83eaced69b81c4fb72c1693995e67bbff6f194a10e7f2280addf8e0bc45ae35f7f10f439a6c6ac13415515dd25127d13c9b16bbdb27c0c3f1b09ba21cdcc47e00db03aa8b1f1f2d1aef835bb988d
2026-02-02T15:35:29.399476 [FINEST] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - RAW_SOCKET_DATA_CHUNK_RECV (202 bytes): 00c81ab8c3bb463285e4ad0e14ba708113064f184243cda959028a113aaa176b0f0f3b6e9e2b9b93585e6857b06d19488ed0c8de07071eaec59d788efc92beee2999ce7dcd30d4bfae70263870a47b19161dfdf75ca7d4e4cbcd18851df0c328e41342646161d27c961c18c248de324769071b67beb9374ce914deef83eaced69b81c4fb72c1693995e67bbff6f194a10e7f2280addf8e0bc45ae35f7f10f439a6c6ac13415515dd25127d13c9b16bbdb27c0c3f1b09ba21cdcc47e00db03aa8b1f1f2d1aef835bb988d
2026-02-02T15:35:29.399476 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(4c0f125f) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.399476 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(4c0f125f) END (from buffer). Returning 2 bytes: 00c8. Buffer after: 200 bytes: 1ab8c3bb463285e4ad0e14ba708113064f184243cda959028a113aaa176b0f0f3b6e9e2b9b93585e6857b06d19488ed0c8de07071eaec59d788efc92beee2999ce7dcd30d4bfae70263870a47b19161dfdf75ca7d4e4cbcd18851df0c328e41342646161d27c961c18c248de324769071b67beb9374ce914deef83eaced69b81c4fb72c1693995e67bbff6f194a10e7f2280addf8e0bc45ae35f7f10f439a6c6ac13415515dd25127d13c9b16bbdb27c0c3f1b09ba21cdcc47e00db03aa8b1f1f2d1aef835bb988d
2026-02-02T15:35:29.399476 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(90adc54f) START. Requested: 200. Buffer: 200 bytes.
2026-02-02T15:35:29.399476 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(90adc54f) END (from buffer). Returning 200 bytes: 1ab8c3bb463285e4ad0e14ba708113064f184243cda959028a113aaa176b0f0f3b6e9e2b9b93585e6857b06d19488ed0c8de07071eaec59d788efc92beee2999ce7dcd30d4bfae70263870a47b19161dfdf75ca7d4e4cbcd18851df0c328e41342646161d27c961c18c248de324769071b67beb9374ce914deef83eaced69b81c4fb72c1693995e67bbff6f194a10e7f2280addf8e0bc45ae35f7f10f439a6c6ac13415515dd25127d13c9b16bbdb27c0c3f1b09ba21cdcc47e00db03aa8b1f1f2d1aef835bb988d. Buffer after: 0 bytes: 
2026-02-02T15:35:29.399476 [INFO] [NoiseProtocol] secureOutbound: Read msg2: 200 bytes
2026-02-02T15:35:29.414262 [INFO] [NoiseProtocol] secureOutbound: Writing msg3 (s,se + payload): 168 bytes
2026-02-02T15:35:29.414262 [FINER] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Writing 170 bytes: 00a8b75fd5391ff3ca6538301e6ba7fddf898106637b390d13295ff966bd35188d29e42bb1ba54f96fffe79765deea0d61c2171c9181a3b15c344dc3f4ac7cdd61662fd33cdff6edeb8b15cae901f109b2141dd63be8fb3eab1f0e256bc4e948b488a51f43b93061ac39775b6c52fa7dce6aeff79b3bb16a3c47262864c4f297049213e673beec8dc5e651ad9e828cca9e369cec4028b46cc69e25a322acf7503735b5483f4382887d00
2026-02-02T15:35:29.415269 [FINEST] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Flushed 202 bytes successfully. Data preview (hex): 00c81ab8c3bb463285e4ad0e14ba708113064f18...
2026-02-02T15:35:29.415269 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(64c621b8) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:29.415269 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(64c621b8) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:29.415269 [FINEST] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - RAW_SOCKET_DATA_CHUNK_RECV (170 bytes): 00a8b75fd5391ff3ca6538301e6ba7fddf898106637b390d13295ff966bd35188d29e42bb1ba54f96fffe79765deea0d61c2171c9181a3b15c344dc3f4ac7cdd61662fd33cdff6edeb8b15cae901f109b2141dd63be8fb3eab1f0e256bc4e948b488a51f43b93061ac39775b6c52fa7dce6aeff79b3bb16a3c47262864c4f297049213e673beec8dc5e651ad9e828cca9e369cec4028b46cc69e25a322acf7503735b5483f4382887d00
2026-02-02T15:35:29.415269 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(64c621b8) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.415269 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(64c621b8) END (from buffer). Returning 2 bytes: 00a8. Buffer after: 168 bytes: b75fd5391ff3ca6538301e6ba7fddf898106637b390d13295ff966bd35188d29e42bb1ba54f96fffe79765deea0d61c2171c9181a3b15c344dc3f4ac7cdd61662fd33cdff6edeb8b15cae901f109b2141dd63be8fb3eab1f0e256bc4e948b488a51f43b93061ac39775b6c52fa7dce6aeff79b3bb16a3c47262864c4f297049213e673beec8dc5e651ad9e828cca9e369cec4028b46cc69e25a322acf7503735b5483f4382887d00
2026-02-02T15:35:29.415269 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(31446380) START. Requested: 168. Buffer: 168 bytes.
2026-02-02T15:35:29.415269 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(31446380) END (from buffer). Returning 168 bytes: b75fd5391ff3ca6538301e6ba7fddf898106637b390d13295ff966bd35188d29e42bb1ba54f96fffe79765deea0d61c2171c9181a3b15c344dc3f4ac7cdd61662fd33cdff6edeb8b15cae901f109b2141dd63be8fb3eab1f0e256bc4e948b488a51f43b93061ac39775b6c52fa7dce6aeff79b3bb16a3c47262864c4f297049213e673beec8dc5e651ad9e828cca9e369cec4028b46cc69e25a322acf7503735b5483f4382887d00. Buffer after: 0 bytes: 
2026-02-02T15:35:29.415269 [INFO] [NoiseProtocol] secureInbound: Read msg3: 168 bytes
2026-02-02T15:35:29.421397 [INFO] [NoiseProtocol] secureInbound: Handshake complete. Remote peer: 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:29.422397 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:35:29.422397 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1059092378
2026-02-02T15:35:29.423502 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1061664014
2026-02-02T15:35:29.423502 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:29.423502 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:29.423502 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.423502 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.423502 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [123, 172, 0, 48, 102, 157, 66, 1, 3, 57, 3, 255, 65, 52, 168, 8, 119, 249, 134, 62, 185, 239, 164, 240, 154, 247, 193, 40, 242, 201, 230, 59]
2026-02-02T15:35:29.423502 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [57, 249, 251, 229, 147, 246, 6, 238, 57, 181, 19, 200, 113, 158, 245, 228, 64, 209, 84, 76, 254, 4, 151, 31, 111, 192, 249, 94, 65, 178, 30, 104]
2026-02-02T15:35:29.423502 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.424663 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:29.424663 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:29.424663 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:29.424663 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:29.424663 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(964f7418) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:29.424663 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(964f7418) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:29.424663 [FINEST] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Flushed 170 bytes successfully. Data preview (hex): 00a8b75fd5391ff3ca6538301e6ba7fddf898106...
2026-02-02T15:35:29.425169 [INFO] [NoiseProtocol] secureOutbound: Handshake complete. Remote peer: 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:29.425169 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:35:29.425169 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1061664014
2026-02-02T15:35:29.425169 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1059092378
2026-02-02T15:35:29.425169 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [57, 249, 251, 229, 147, 246, 6, 238, 57, 181, 19, 200, 113, 158, 245, 228, 64, 209, 84, 76, 254, 4, 151, 31, 111, 192, 249, 94, 65, 178, 30, 104]
2026-02-02T15:35:29.425683 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [123, 172, 0, 48, 102, 157, 66, 1, 3, 57, 3, 255, 65, 52, 168, 8, 119, 249, 134, 62, 185, 239, 164, 240, 154, 247, 193, 40, 242, 201, 230, 59]
2026-02-02T15:35:29.425683 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:29.425683 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:35:29.426194 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:35:29.426194 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:35:29.426194 [FINER] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Writing 38 bytes: 0024bbedcbbee3187796e8c799d05777da500bd30b4a312abed42a7172daa49cd16073705dcd
2026-02-02T15:35:29.426194 [FINEST] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 0024bbedcbbee3187796e8c799d05777da500bd30b4a312abed42a7172daa49cd16073705dcd
2026-02-02T15:35:29.426194 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(964f7418) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.426194 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(964f7418) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: bbedcbbee3187796e8c799d05777da500bd30b4a312abed42a7172daa49cd16073705dcd
2026-02-02T15:35:29.426194 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:35:29.426194 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:29.426194 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:35:29.426194 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:35:29.426194 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:35:29.426194 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:35:29.427707 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:35:29.427707 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(e9e77110) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:35:29.427707 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(e9e77110) END (from buffer). Returning 36 bytes: bbedcbbee3187796e8c799d05777da500bd30b4a312abed42a7172daa49cd16073705dcd. Buffer after: 0 bytes: 
2026-02-02T15:35:29.427707 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [187, 237, 203, 190]
2026-02-02T15:35:29.427707 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:35:29.427707 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: bbedcbbee3187796e8c799d05777da500bd30b4a312abed42a7172daa49cd16073705dcd
2026-02-02T15:35:29.427707 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:35:29.427707 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:35:29.428710 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: bbedcbbee3187796e8c799d05777da500bd30b4a
2026-02-02T15:35:29.428710 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 312abed42a7172daa49cd16073705dcd
2026-02-02T15:35:29.428710 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [187, 237, 203, 190]
2026-02-02T15:35:29.428710 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [49, 42, 190, 212]
2026-02-02T15:35:29.428710 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [49, 42, 190, 212, 42, 113, 114, 218, 164, 156, 209, 96, 115, 112, 93, 205]
2026-02-02T15:35:29.429213 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.429213 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061664014): [57, 249, 251, 229, 147, 246, 6, 238, 57, 181, 19, 200, 113, 158, 245, 228, 64, 209, 84, 76, 254, 4, 151, 31, 111, 192, 249, 94, 65, 178, 30, 104]
2026-02-02T15:35:29.429213 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:35:29.429213 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:29.429213 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:29.429213 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.429213 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:29.429213 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:29.429213 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:29.429213 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:35:29.430305 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:35:29.430305 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:35:29.430305 [FINER] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Writing 38 bytes: 0024d542615c0930f6aa8f77eadd01008777c15a3de926e0e77835d92d9e501177d688cf65fb
2026-02-02T15:35:29.430810 [FINEST] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Flushed 38 bytes successfully. Data preview (hex): 0024d542615c0930f6aa8f77eadd01008777c15a...
2026-02-02T15:35:29.430810 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:29.430810 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:29.430810 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:29.430810 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.430810 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.430810 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.430810 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:29.430810 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:29.430810 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:29.430810 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:29.430810 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(09899c9f) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:29.430810 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(09899c9f) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:29.430810 [FINEST] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Flushed 38 bytes successfully. Data preview (hex): 0024bbedcbbee3187796e8c799d05777da500bd3...
2026-02-02T15:35:29.430810 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:29.430810 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.430810 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.430810 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.432352 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:29.432352 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:29.432352 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:29.432352 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:29.432352 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(298df5e8) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:29.432352 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(298df5e8) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:29.432868 [FINEST] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 0024d542615c0930f6aa8f77eadd01008777c15a3de926e0e77835d92d9e501177d688cf65fb
2026-02-02T15:35:29.432868 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(298df5e8) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.432868 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(298df5e8) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: d542615c0930f6aa8f77eadd01008777c15a3de926e0e77835d92d9e501177d688cf65fb
2026-02-02T15:35:29.432868 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:35:29.432868 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:29.432868 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:35:29.432868 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:35:29.432868 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:35:29.432868 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:35:29.432868 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:35:29.432868 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(1dcae6b5) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:35:29.432868 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(1dcae6b5) END (from buffer). Returning 36 bytes: d542615c0930f6aa8f77eadd01008777c15a3de926e0e77835d92d9e501177d688cf65fb. Buffer after: 0 bytes: 
2026-02-02T15:35:29.432868 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [213, 66, 97, 92]
2026-02-02T15:35:29.432868 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:35:29.432868 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: d542615c0930f6aa8f77eadd01008777c15a3de926e0e77835d92d9e501177d688cf65fb
2026-02-02T15:35:29.432868 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:35:29.432868 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:35:29.432868 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: d542615c0930f6aa8f77eadd01008777c15a3de9
2026-02-02T15:35:29.432868 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 26e0e77835d92d9e501177d688cf65fb
2026-02-02T15:35:29.432868 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [213, 66, 97, 92]
2026-02-02T15:35:29.432868 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [38, 224, 231, 120]
2026-02-02T15:35:29.432868 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [38, 224, 231, 120, 53, 217, 45, 158, 80, 17, 119, 214, 136, 207, 101, 251]
2026-02-02T15:35:29.432868 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.434377 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059092378): [123, 172, 0, 48, 102, 157, 66, 1, 3, 57, 3, 255, 65, 52, 168, 8, 119, 249, 134, 62, 185, 239, 164, 240, 154, 247, 193, 40, 242, 201, 230, 59]
2026-02-02T15:35:29.434377 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:35:29.434377 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:29.434891 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:29.434891 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.434891 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:29.434891 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:35:29.434891 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:35:29.434891 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:35:29.434891 [FINER] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Writing 32 bytes: 001e4615bf4441a8f2bdade233a32f183a8a0a8a8d58a5e02e66cc211981f647
2026-02-02T15:35:29.435949 [FINEST] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e4615bf4441a8f2bdade233a32f183a8a0a8a8d58a5e02e66cc211981f647
2026-02-02T15:35:29.435949 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(09899c9f) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.435949 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(09899c9f) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 4615bf4441a8f2bdade233a32f183a8a0a8a8d58a5e02e66cc211981f647
2026-02-02T15:35:29.435949 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:35:29.435949 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:29.435949 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:35:29.435949 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:35:29.435949 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:35:29.435949 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:35:29.435949 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:35:29.435949 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(ae25b737) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:35:29.435949 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(ae25b737) END (from buffer). Returning 30 bytes: 4615bf4441a8f2bdade233a32f183a8a0a8a8d58a5e02e66cc211981f647. Buffer after: 0 bytes: 
2026-02-02T15:35:29.435949 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [70, 21, 191, 68]
2026-02-02T15:35:29.435949 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:35:29.435949 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 4615bf4441a8f2bdade233a32f183a8a0a8a8d58a5e02e66cc211981f647
2026-02-02T15:35:29.435949 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:35:29.435949 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:35:29.435949 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 4615bf4441a8f2bdade233a32f18
2026-02-02T15:35:29.435949 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 3a8a0a8a8d58a5e02e66cc211981f647
2026-02-02T15:35:29.435949 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [70, 21, 191, 68]
2026-02-02T15:35:29.435949 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [58, 138, 10, 138]
2026-02-02T15:35:29.435949 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [58, 138, 10, 138, 141, 88, 165, 224, 46, 102, 204, 33, 25, 129, 246, 71]
2026-02-02T15:35:29.435949 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.437452 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061664014): [57, 249, 251, 229, 147, 246, 6, 238, 57, 181, 19, 200, 113, 158, 245, 228, 64, 209, 84, 76, 254, 4, 151, 31, 111, 192, 249, 94, 65, 178, 30, 104]
2026-02-02T15:35:29.437452 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:35:29.437452 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:29.437452 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:29.437452 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.437452 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/yamux/1.0.0"
2026-02-02T15:35:29.437452 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/yamux/1.0.0"
2026-02-02T15:35:29.437452 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/yamux/1.0.0". Sending acknowledgment: "/yamux/1.0.0".
2026-02-02T15:35:29.437452 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:29.437452 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:35:29.438739 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:35:29.438739 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:35:29.438739 [FINER] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Writing 32 bytes: 001e2ffae9bfcfdd3b94d9e0fe08b17360c49652c3a73790829e5cf1c575edc9
2026-02-02T15:35:29.438739 [FINEST] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Flushed 32 bytes successfully. Data preview (hex): 001e4615bf4441a8f2bdade233a32f183a8a0a8a...
2026-02-02T15:35:29.438739 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:29.438739 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.438739 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.439737 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.439737 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:29.439737 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:29.439737 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:29.440241 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:29.440241 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(e7389e81) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:29.440241 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(e7389e81) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:29.440241 [FINEST] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e2ffae9bfcfdd3b94d9e0fe08b17360c49652c3a73790829e5cf1c575edc9
2026-02-02T15:35:29.440241 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(e7389e81) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.441248 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(e7389e81) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 2ffae9bfcfdd3b94d9e0fe08b17360c49652c3a73790829e5cf1c575edc9
2026-02-02T15:35:29.441248 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:35:29.441248 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:29.441248 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:35:29.441248 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:35:29.441248 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:35:29.441248 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:35:29.441248 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:35:29.441946 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(8c59113f) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:35:29.441946 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(8c59113f) END (from buffer). Returning 30 bytes: 2ffae9bfcfdd3b94d9e0fe08b17360c49652c3a73790829e5cf1c575edc9. Buffer after: 0 bytes: 
2026-02-02T15:35:29.441946 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [47, 250, 233, 191]
2026-02-02T15:35:29.441946 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:35:29.441946 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 2ffae9bfcfdd3b94d9e0fe08b17360c49652c3a73790829e5cf1c575edc9
2026-02-02T15:35:29.441946 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:35:29.441946 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:35:29.441946 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 2ffae9bfcfdd3b94d9e0fe08b173
2026-02-02T15:35:29.441946 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 60c49652c3a73790829e5cf1c575edc9
2026-02-02T15:35:29.441946 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [47, 250, 233, 191]
2026-02-02T15:35:29.442962 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [96, 196, 150, 82]
2026-02-02T15:35:29.442962 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [96, 196, 150, 82, 195, 167, 55, 144, 130, 158, 92, 241, 197, 117, 237, 201]
2026-02-02T15:35:29.442962 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.442962 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059092378): [123, 172, 0, 48, 102, 157, 66, 1, 3, 57, 3, 255, 65, 52, 168, 8, 119, 249, 134, 62, 185, 239, 164, 240, 154, 247, 193, 40, 242, 201, 230, 59]
2026-02-02T15:35:29.442962 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:35:29.442962 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:29.442962 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:29.442962 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.442962 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:29.442962 [FINE] [Swarm] Swarm._dialSingleAddr: Successfully dialed and upgraded connection to 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN at /ip4/127.0.0.1/tcp/4102
2026-02-02T15:35:29.444581 [FINE] [HappyEyeballsDialer] Connected via /ip4/127.0.0.1/tcp/4102
2026-02-02T15:35:29.444581 [FINE] [Swarm] Swarm.dialPeer: Successfully connected to 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN
2026-02-02T15:35:29.444581 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068129444-539
2026-02-02T15:35:29.444581 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:29.444581 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:35:29.444581 [FINE] [SwarmConn] SwarmConn (0): Context set: 4db81a24-a110-4244-a3a5-ccfe5a7e22b7
2026-02-02T15:35:29.444581 [INFO] [Swarm] Swarm.dialPeer: Dial latency for 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN: 74ms
2026-02-02T15:35:29.444581 [FINEST] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Flushed 32 bytes successfully. Data preview (hex): 001e2ffae9bfcfdd3b94d9e0fe08b17360c49652...
2026-02-02T15:35:29.444581 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/yamux/1.0.0".
2026-02-02T15:35:29.444581 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/yamux/1.0.0" and its handler.
2026-02-02T15:35:29.444581 [FINE] [multistream] [multistreamMuxer - handle] Protocol /yamux/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:29.446289 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /yamux/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:35:29.446289 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:29.446289 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068129446-4059
2026-02-02T15:35:29.446289 [FINE] [SwarmConn] SwarmConn (1): Setting up health monitoring for connection to 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:29.446289 [FINE] [SwarmConn] SwarmConn (1): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:35:29.446289 [FINE] [SwarmConn] SwarmConn (1): Context set: 036b493c-648f-4cc0-aaf2-a26cfaef4408
2026-02-02T15:35:29.446289 [FINE] [Swarm] Storing inbound connection for peer=12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom, conn_id=1
2026-02-02T15:35:29.447809 [FINE] [Swarm] Connection stored. Total connections for "12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom": 1
2026-02-02T15:35:29.447809 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom. Conn ID: 1, Direction: Direction.inbound
2026-02-02T15:35:29.447809 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom.
2026-02-02T15:35:29.448814 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom. Conn ID: 1
2026-02-02T15:35:29.448814 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom.
2026-02-02T15:35:29.448814 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom.
2026-02-02T15:35:29.448814 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:29.449320 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Inbound connection from 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom. This peer is the LISTENER - waiting for remote to initiate identify protocol.
2026-02-02T15:35:29.449320 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:29.449320 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.449320 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.449320 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.449320 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:29.449320 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:29.449320 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:29.449320 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:29.449320 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:29.449320 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(497a23c5) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:29.449320 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(497a23c5) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:29.449320 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:29.449320 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.449320 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.449320 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.449320 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:29.450861 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:29.450861 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:29.450861 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:29.450861 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:29.450861 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(a1e57470) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:29.450861 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(a1e57470) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:29.469547 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. Conn ID: 0, Direction: Direction.outbound
2026-02-02T15:35:29.469547 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:29.469547 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. Conn ID: 0
2026-02-02T15:35:29.469547 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:29.469547 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:29.469547 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Outbound connection to 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. This peer is the DIALER - initiating identify protocol.
2026-02-02T15:35:29.469547 [FINE] [SwarmConn] SwarmConn.newStream (0): Entered to peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. Context HashCode: 1038728820
2026-02-02T15:35:29.469547 [FINE] [SwarmConn] SwarmConn.newStream (0): Connection is open.
2026-02-02T15:35:29.470616 [FINE] [SwarmConn] SwarmConn.newStream (0): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:35:29.470616 [FINE] [SwarmConn] SwarmConn.newStream (0): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:35:29.470616 [FINE] [YamuxStream] [2][Client] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:29.470616 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:29.470616 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:29.470616 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:35:29.470616 [FINE] [Swarm] Swarm.dialPeer: Connection established for 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN. Conn ID: 0
2026-02-02T15:35:29.470616 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:29.470616 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:29.470616 [FINER] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Writing 30 bytes: 001c05c57c1992de6c40d1227011b8ca5918cb5f4d6ade622ab875ae991a
2026-02-02T15:35:29.472121 [FINEST] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c05c57c1992de6c40d1227011b8ca5918cb5f4d6ade622ab875ae991a
2026-02-02T15:35:29.472121 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(a1e57470) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.472121 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(a1e57470) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 05c57c1992de6c40d1227011b8ca5918cb5f4d6ade622ab875ae991a
2026-02-02T15:35:29.472121 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:29.472121 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:29.472121 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:29.473151 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:29.473151 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:29.473151 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:29.473151 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:29.473151 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(1d4a5ef1) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:29.473151 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(1d4a5ef1) END (from buffer). Returning 28 bytes: 05c57c1992de6c40d1227011b8ca5918cb5f4d6ade622ab875ae991a. Buffer after: 0 bytes: 
2026-02-02T15:35:29.473151 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [5, 197, 124, 25]
2026-02-02T15:35:29.473151 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:29.474151 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 05c57c1992de6c40d1227011b8ca5918cb5f4d6ade622ab875ae991a
2026-02-02T15:35:29.474151 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:29.474151 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:29.474151 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 05c57c1992de6c40d1227011
2026-02-02T15:35:29.474151 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: b8ca5918cb5f4d6ade622ab875ae991a
2026-02-02T15:35:29.474151 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [5, 197, 124, 25]
2026-02-02T15:35:29.474151 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [184, 202, 89, 24]
2026-02-02T15:35:29.474151 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [184, 202, 89, 24, 203, 95, 77, 106, 222, 98, 42, 184, 117, 174, 153, 26]
2026-02-02T15:35:29.474151 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.474151 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061664014): [57, 249, 251, 229, 147, 246, 6, 238, 57, 181, 19, 200, 113, 158, 245, 228, 64, 209, 84, 76, 254, 4, 151, 31, 111, 192, 249, 94, 65, 178, 30, 104]
2026-02-02T15:35:29.475150 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:35:29.475150 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:29.475656 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:29.475656 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:29.475656 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.475656 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:29.475656 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:35:29.475656 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:29.475656 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:29.475656 [FINER] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Writing 30 bytes: 001c9709e85c03808920d299ae8954d220e4510c9511ffa711b0d721fb50
2026-02-02T15:35:29.476660 [FINEST] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Flushed 30 bytes successfully. Data preview (hex): 001c05c57c1992de6c40d1227011b8ca5918cb5f...
2026-02-02T15:35:29.476660 [FINEST] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c9709e85c03808920d299ae8954d220e4510c9511ffa711b0d721fb50
2026-02-02T15:35:29.476660 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(497a23c5) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.476660 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(497a23c5) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 9709e85c03808920d299ae8954d220e4510c9511ffa711b0d721fb50
2026-02-02T15:35:29.476660 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:29.476660 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:29.476660 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:29.476660 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:29.476660 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:29.476660 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:29.476660 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:29.476660 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(04a82bbb) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:29.476660 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(04a82bbb) END (from buffer). Returning 28 bytes: 9709e85c03808920d299ae8954d220e4510c9511ffa711b0d721fb50. Buffer after: 0 bytes: 
2026-02-02T15:35:29.476660 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [151, 9, 232, 92]
2026-02-02T15:35:29.476660 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:29.478615 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 9709e85c03808920d299ae8954d220e4510c9511ffa711b0d721fb50
2026-02-02T15:35:29.478615 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:29.478615 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:29.478615 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 9709e85c03808920d299ae89
2026-02-02T15:35:29.478615 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 54d220e4510c9511ffa711b0d721fb50
2026-02-02T15:35:29.478615 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [151, 9, 232, 92]
2026-02-02T15:35:29.478615 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [84, 210, 32, 228]
2026-02-02T15:35:29.478615 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [84, 210, 32, 228, 81, 12, 149, 17, 255, 167, 17, 176, 215, 33, 251, 80]
2026-02-02T15:35:29.478615 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.478615 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059092378): [123, 172, 0, 48, 102, 157, 66, 1, 3, 57, 3, 255, 65, 52, 168, 8, 119, 249, 134, 62, 185, 239, 164, 240, 154, 247, 193, 40, 242, 201, 230, 59]
2026-02-02T15:35:29.479618 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:35:29.479618 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:29.480124 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:29.480124 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:29.480124 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.480124 [FINER] [YamuxStream] [2][Client] StreamID=1 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:35:29.480124 [FINER] [YamuxStream] [2][Client] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:35:29.480629 [FINE] [YamuxStream] [2][Client] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:29.480629 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:35:29.480629 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:35:29.481144 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:29.481144 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:29.481144 [FINER] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Writing 30 bytes: 001cb32506ea3c2fb7b86f7ab1b5a30eaf78751777550cd9dbfabdb977e7
2026-02-02T15:35:29.481144 [FINEST] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Flushed 30 bytes successfully. Data preview (hex): 001c9709e85c03808920d299ae8954d220e4510c...
2026-02-02T15:35:29.481144 [FINE] [YamuxStream] [3][Server] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:29.481144 [FINER] [YamuxStream] [3][Server] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:35:29.481144 [FINE] [YamuxStream] [3][Server] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:29.482158 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:35:29.482158 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:35:29.482158 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:29.482158 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:29.482158 [FINER] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Writing 30 bytes: 001c80b29520b1096c73b8e0a84c3b202d9d7519f47c006dd9c5b4fc55f0
2026-02-02T15:35:29.482158 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:29.482158 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.482158 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.482158 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.482158 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:29.483405 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:29.483405 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:29.483405 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:29.483405 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:29.483405 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(d1678ce5) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:29.483405 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(d1678ce5) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:29.483405 [FINEST] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cb32506ea3c2fb7b86f7ab1b5a30eaf78751777550cd9dbfabdb977e7
2026-02-02T15:35:29.483405 [FINEST] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Flushed 30 bytes successfully. Data preview (hex): 001cb32506ea3c2fb7b86f7ab1b5a30eaf787517...
2026-02-02T15:35:29.484410 [FINE] [SwarmConn] SwarmConn.newStream (0): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 1
2026-02-02T15:35:29.484410 [FINE] [SwarmConn] SwarmConn.newStream (0): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 1.
2026-02-02T15:35:29.484410 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068129484-6369 for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:29.484410 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:35:29.484410 [INFO] [ConnectionHealthMetrics] Connection health state changed: ConnectionHealthState.unknown -> ConnectionHealthState.healthy
2026-02-02T15:35:29.484410 [FINE] [identify]  [IDENTIFY-STREAM-CREATE] peer=12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, stream_id=1, protocol=/ipfs/id/1.0.0, duration=14ms
2026-02-02T15:35:29.484410 [FINE] [YamuxStream] [2][Client] StreamID=1 setDeadline() set to 2026-02-02T15:35:59.484410
2026-02-02T15:35:29.485414 [FINE] [YamuxStream] [2][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:35:29.485414 [INFO] [SwarmConn] SwarmConn (0): Health state changed to ConnectionHealthState.healthy for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:29.485919 [INFO] [Swarm] Swarm: Connection health changed for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw (0): ConnectionHealthState.healthy -> ConnectionHealthState.healthy
2026-02-02T15:35:29.485919 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:29.485919 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:35:29.485919 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:29.485919 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:29.485919 [FINER] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Writing 50 bytes: 00308ffb6e5613979fd3cc007c69a875875df4bbfbc644bb9e67d944b1e224878ae109eb159359ce7703ed64ac8cd647491c
2026-02-02T15:35:29.486923 [FINEST] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Flushed 50 bytes successfully. Data preview (hex): 00308ffb6e5613979fd3cc007c69a875875df4bb...
2026-02-02T15:35:29.486923 [FINE] [YamuxStream] [2][Client] StreamID=1 Direct write: Successfully wrote all 20 bytes in 1ms
2026-02-02T15:35:29.486923 [FINEST] [YamuxStream] [2][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:29.486923 [FINEST] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c80b29520b1096c73b8e0a84c3b202d9d7519f47c006dd9c5b4fc55f0
2026-02-02T15:35:29.486923 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(d1678ce5) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.486923 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(d1678ce5) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 80b29520b1096c73b8e0a84c3b202d9d7519f47c006dd9c5b4fc55f0
2026-02-02T15:35:29.487923 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:29.487923 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:29.488428 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:29.488428 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:29.488428 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:29.488428 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:29.488428 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:29.488428 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(5ad3b478) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:29.488428 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(5ad3b478) END (from buffer). Returning 28 bytes: 80b29520b1096c73b8e0a84c3b202d9d7519f47c006dd9c5b4fc55f0. Buffer after: 0 bytes: 
2026-02-02T15:35:29.488428 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [128, 178, 149, 32]
2026-02-02T15:35:29.488428 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:29.488428 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 80b29520b1096c73b8e0a84c3b202d9d7519f47c006dd9c5b4fc55f0
2026-02-02T15:35:29.488428 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:29.490456 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:29.490456 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 80b29520b1096c73b8e0a84c
2026-02-02T15:35:29.490456 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 3b202d9d7519f47c006dd9c5b4fc55f0
2026-02-02T15:35:29.490456 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [128, 178, 149, 32]
2026-02-02T15:35:29.490456 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [59, 32, 45, 157]
2026-02-02T15:35:29.490456 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [59, 32, 45, 157, 117, 25, 244, 124, 0, 109, 217, 197, 180, 252, 85, 240]
2026-02-02T15:35:29.491228 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.491228 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059092378): [123, 172, 0, 48, 102, 157, 66, 1, 3, 57, 3, 255, 65, 52, 168, 8, 119, 249, 134, 62, 185, 239, 164, 240, 154, 247, 193, 40, 242, 201, 230, 59]
2026-02-02T15:35:29.491742 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:35:29.491742 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:29.491742 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:35:29.491742 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:29.491742 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.492757 [FINER] [YamuxStream] [2][Client] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262124, New: 524268
2026-02-02T15:35:29.492757 [FINEST] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Flushed 30 bytes successfully. Data preview (hex): 001c80b29520b1096c73b8e0a84c3b202d9d7519...
2026-02-02T15:35:29.492757 [FINER] [YamuxStream] [3][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:35:29.492757 [FINE] [Swarm] Accepted inbound stream 1 from 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom on conn 1
2026-02-02T15:35:29.492757 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068129492-3108 for peer 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:29.493757 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:29.493757 [FINEST] [YamuxStream] [3][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:29.493757 [FINEST] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 00308ffb6e5613979fd3cc007c69a875875df4bbfbc644bb9e67d944b1e224878ae109eb159359ce7703ed64ac8cd647491c
2026-02-02T15:35:29.493757 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:29.493757 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.493757 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.494757 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.494757 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:29.494757 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:29.494757 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:29.495757 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:29.495757 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:29.495757 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(17f8181a) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:29.495757 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(17f8181a) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:29.495757 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:29.495757 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.496756 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.496756 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.496756 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:29.496756 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:29.496756 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:29.496756 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:29.497261 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:29.497261 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(171842c3) START. Requested: 2. Buffer: 80 bytes.
2026-02-02T15:35:29.497261 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(171842c3) END (from buffer). Returning 2 bytes: 001c. Buffer after: 78 bytes: b32506ea3c2fb7b86f7ab1b5a30eaf78751777550cd9dbfabdb977e700308ffb6e5613979fd3cc007c69a875875df4bbfbc644bb9e67d944b1e224878ae109eb159359ce7703ed64ac8cd647491c
2026-02-02T15:35:29.497765 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:29.497765 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:29.497765 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:29.497765 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:29.497765 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:29.497765 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:29.497765 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:29.497765 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(b728469a) START. Requested: 28. Buffer: 78 bytes.
2026-02-02T15:35:29.497765 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(b728469a) END (from buffer). Returning 28 bytes: b32506ea3c2fb7b86f7ab1b5a30eaf78751777550cd9dbfabdb977e7. Buffer after: 50 bytes: 00308ffb6e5613979fd3cc007c69a875875df4bbfbc644bb9e67d944b1e224878ae109eb159359ce7703ed64ac8cd647491c
2026-02-02T15:35:29.497765 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [179, 37, 6, 234]
2026-02-02T15:35:29.497765 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:29.497765 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: b32506ea3c2fb7b86f7ab1b5a30eaf78751777550cd9dbfabdb977e7
2026-02-02T15:35:29.497765 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:29.497765 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:29.497765 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: b32506ea3c2fb7b86f7ab1b5
2026-02-02T15:35:29.497765 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: a30eaf78751777550cd9dbfabdb977e7
2026-02-02T15:35:29.497765 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [179, 37, 6, 234]
2026-02-02T15:35:29.497765 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [163, 14, 175, 120]
2026-02-02T15:35:29.497765 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [163, 14, 175, 120, 117, 23, 119, 85, 12, 217, 219, 250, 189, 185, 119, 231]
2026-02-02T15:35:29.498778 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.498778 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061664014): [57, 249, 251, 229, 147, 246, 6, 238, 57, 181, 19, 200, 113, 158, 245, 228, 64, 209, 84, 76, 254, 4, 151, 31, 111, 192, 249, 94, 65, 178, 30, 104]
2026-02-02T15:35:29.498778 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:35:29.498778 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:29.498778 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:35:29.498778 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:29.498778 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.498778 [FINER] [YamuxStream] [3][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:35:29.498778 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:29.498778 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.498778 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.498778 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.498778 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:29.498778 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:29.498778 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:29.499778 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:29.499778 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:29.499778 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(fe79db9b) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:35:29.499778 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(fe79db9b) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 8ffb6e5613979fd3cc007c69a875875df4bbfbc644bb9e67d944b1e224878ae109eb159359ce7703ed64ac8cd647491c
2026-02-02T15:35:29.499778 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:29.499778 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:29.499778 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:29.499778 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:29.499778 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:29.499778 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:29.499778 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:29.499778 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(5bb85538) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:29.499778 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(5bb85538) END (from buffer). Returning 48 bytes: 8ffb6e5613979fd3cc007c69a875875df4bbfbc644bb9e67d944b1e224878ae109eb159359ce7703ed64ac8cd647491c. Buffer after: 0 bytes: 
2026-02-02T15:35:29.499778 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [143, 251, 110, 86]
2026-02-02T15:35:29.499778 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:29.499778 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 8ffb6e5613979fd3cc007c69a875875df4bbfbc644bb9e67d944b1e224878ae109eb159359ce7703ed64ac8cd647491c
2026-02-02T15:35:29.499778 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:29.499778 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:29.499778 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 8ffb6e5613979fd3cc007c69a875875df4bbfbc644bb9e67d944b1e224878ae1
2026-02-02T15:35:29.499778 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 09eb159359ce7703ed64ac8cd647491c
2026-02-02T15:35:29.499778 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [143, 251, 110, 86]
2026-02-02T15:35:29.499778 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [9, 235, 21, 147]
2026-02-02T15:35:29.500777 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [9, 235, 21, 147, 89, 206, 119, 3, 237, 100, 172, 140, 214, 71, 73, 28]
2026-02-02T15:35:29.500777 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.500777 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061664014): [57, 249, 251, 229, 147, 246, 6, 238, 57, 181, 19, 200, 113, 158, 245, 228, 64, 209, 84, 76, 254, 4, 151, 31, 111, 192, 249, 94, 65, 178, 30, 104]
2026-02-02T15:35:29.500777 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:35:29.500777 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:29.500777 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:35:29.501281 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:29.501281 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.501281 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:29.501281 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.501281 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.501281 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.501281 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:29.501281 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:29.501281 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:29.501281 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:29.501281 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.501785 [FINE] [YamuxStream] [3][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:29.501785 [FINE] [YamuxStream] [3][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:29.501785 [FINE] [YamuxStream] [3][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:29.501785 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:29.501785 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:29.501785 [FINE] [YamuxStream] [3][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:35:29.501785 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:29.501785 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:35:29.501785 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:29.501785 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:29.501785 [FINER] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Writing 50 bytes: 0030b45ef1ac7288b48ae6782c7eb44e9c5853b56c7e90c22b0bc0bc975553cdaeef9689e3c57c20cc6cceb4d60cb6be53be
2026-02-02T15:35:29.501785 [FINEST] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Flushed 50 bytes successfully. Data preview (hex): 0030b45ef1ac7288b48ae6782c7eb44e9c5853b5...
2026-02-02T15:35:29.502848 [FINE] [YamuxStream] [3][Server] StreamID=1 Direct write: Successfully wrote all 20 bytes in 1ms
2026-02-02T15:35:29.502848 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:29.502848 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:29.502848 [FINEST] [YamuxStream] [3][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:29.502848 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:29.502848 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.502848 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.502848 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.502848 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:29.502848 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:29.502848 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:29.502848 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:29.502848 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:29.502848 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(e9c4640e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:29.502848 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(e9c4640e) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:29.502848 [FINEST] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030b45ef1ac7288b48ae6782c7eb44e9c5853b56c7e90c22b0bc0bc975553cdaeef9689e3c57c20cc6cceb4d60cb6be53be
2026-02-02T15:35:29.502848 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(17f8181a) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.503847 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(17f8181a) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: b45ef1ac7288b48ae6782c7eb44e9c5853b56c7e90c22b0bc0bc975553cdaeef9689e3c57c20cc6cceb4d60cb6be53be
2026-02-02T15:35:29.503847 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:29.503847 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:29.503847 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:29.503847 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:29.503847 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:29.503847 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:29.503847 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:29.503847 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(6998ea45) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:29.503847 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(6998ea45) END (from buffer). Returning 48 bytes: b45ef1ac7288b48ae6782c7eb44e9c5853b56c7e90c22b0bc0bc975553cdaeef9689e3c57c20cc6cceb4d60cb6be53be. Buffer after: 0 bytes: 
2026-02-02T15:35:29.504350 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [180, 94, 241, 172]
2026-02-02T15:35:29.504350 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:29.504350 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: b45ef1ac7288b48ae6782c7eb44e9c5853b56c7e90c22b0bc0bc975553cdaeef9689e3c57c20cc6cceb4d60cb6be53be
2026-02-02T15:35:29.504350 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:29.504350 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:29.504350 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: b45ef1ac7288b48ae6782c7eb44e9c5853b56c7e90c22b0bc0bc975553cdaeef
2026-02-02T15:35:29.504350 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 9689e3c57c20cc6cceb4d60cb6be53be
2026-02-02T15:35:29.504350 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [180, 94, 241, 172]
2026-02-02T15:35:29.504350 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [150, 137, 227, 197]
2026-02-02T15:35:29.504350 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [150, 137, 227, 197, 124, 32, 204, 108, 206, 180, 214, 12, 182, 190, 83, 190]
2026-02-02T15:35:29.504350 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.504350 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059092378): [123, 172, 0, 48, 102, 157, 66, 1, 3, 57, 3, 255, 65, 52, 168, 8, 119, 249, 134, 62, 185, 239, 164, 240, 154, 247, 193, 40, 242, 201, 230, 59]
2026-02-02T15:35:29.504350 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:35:29.504350 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:29.505412 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:35:29.505412 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:29.505412 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.505412 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:29.505412 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.505412 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.505412 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.505412 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:29.505412 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:29.505923 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:29.505923 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:29.505923 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.505923 [FINE] [YamuxStream] [2][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:29.505923 [FINE] [YamuxStream] [2][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:29.505923 [FINE] [YamuxStream] [2][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:29.505923 [FINE] [YamuxStream] [2][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:35:29.506928 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:35:29.506928 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:35:29.507433 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:35:29.507433 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:35:29.507433 [FINER] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Writing 46 bytes: 002c405db14b729cf2132874a5b2f2ce13cd653da2781ed17ad2e1d74b811a8d2bf7ae6f1563498ac2aadfbcf8e7
2026-02-02T15:35:29.507433 [FINEST] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Flushed 46 bytes successfully. Data preview (hex): 002c405db14b729cf2132874a5b2f2ce13cd653d...
2026-02-02T15:35:29.507433 [FINE] [YamuxStream] [2][Client] StreamID=1 Direct write: Successfully wrote all 16 bytes in 1ms
2026-02-02T15:35:29.507433 [FINEST] [YamuxStream] [2][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:29.508438 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:29.508438 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.508438 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.508438 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.508438 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:29.508438 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:29.508438 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:29.508438 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:29.508438 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:29.508438 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(69c6a442) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:29.509539 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(69c6a442) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:29.509539 [FINEST] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002c405db14b729cf2132874a5b2f2ce13cd653da2781ed17ad2e1d74b811a8d2bf7ae6f1563498ac2aadfbcf8e7
2026-02-02T15:35:29.509539 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(e9c4640e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.509539 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(e9c4640e) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: 405db14b729cf2132874a5b2f2ce13cd653da2781ed17ad2e1d74b811a8d2bf7ae6f1563498ac2aadfbcf8e7
2026-02-02T15:35:29.509539 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:35:29.509539 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:29.509539 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:35:29.509539 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:35:29.509539 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:35:29.509539 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:35:29.509539 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:35:29.509539 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(efdd97df) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:35:29.509539 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(efdd97df) END (from buffer). Returning 44 bytes: 405db14b729cf2132874a5b2f2ce13cd653da2781ed17ad2e1d74b811a8d2bf7ae6f1563498ac2aadfbcf8e7. Buffer after: 0 bytes: 
2026-02-02T15:35:29.511045 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [64, 93, 177, 75]
2026-02-02T15:35:29.511045 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:35:29.511045 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: 405db14b729cf2132874a5b2f2ce13cd653da2781ed17ad2e1d74b811a8d2bf7ae6f1563498ac2aadfbcf8e7
2026-02-02T15:35:29.511045 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:35:29.511045 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:35:29.511045 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 405db14b729cf2132874a5b2f2ce13cd653da2781ed17ad2e1d74b81
2026-02-02T15:35:29.511045 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 1a8d2bf7ae6f1563498ac2aadfbcf8e7
2026-02-02T15:35:29.511045 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [64, 93, 177, 75]
2026-02-02T15:35:29.511045 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [26, 141, 43, 247]
2026-02-02T15:35:29.511045 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [26, 141, 43, 247, 174, 111, 21, 99, 73, 138, 194, 170, 223, 188, 248, 231]
2026-02-02T15:35:29.511045 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.512154 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061664014): [57, 249, 251, 229, 147, 246, 6, 238, 57, 181, 19, 200, 113, 158, 245, 228, 64, 209, 84, 76, 254, 4, 151, 31, 111, 192, 249, 94, 65, 178, 30, 104]
2026-02-02T15:35:29.512154 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:35:29.512154 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:35:29.513155 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:35:29.513155 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:29.513155 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.513155 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:35:29.513155 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.513155 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.513155 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.513155 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:35:29.513155 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:35:29.513155 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:29.513155 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:35:29.513155 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.513155 [FINE] [YamuxStream] [3][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:35:29.513155 [FINE] [YamuxStream] [3][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:35:29.513155 [FINE] [YamuxStream] [3][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:35:29.513155 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/ipfs/id/1.0.0"
2026-02-02T15:35:29.513155 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/ipfs/id/1.0.0"
2026-02-02T15:35:29.514754 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/ipfs/id/1.0.0". Sending acknowledgment: "/ipfs/id/1.0.0".
2026-02-02T15:35:29.514754 [FINE] [YamuxStream] [3][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:35:29.514754 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:35:29.514754 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:35:29.514754 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:35:29.514754 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:35:29.514754 [FINER] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Writing 46 bytes: 002c8e79c9f9f655626082ae0e53ef66757044666a5c0ecc691f5ce61033b8c9a6cc9bdfc49b4248ad3fd16bfb40
2026-02-02T15:35:29.515986 [FINEST] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Flushed 46 bytes successfully. Data preview (hex): 002c8e79c9f9f655626082ae0e53ef6675704466...
2026-02-02T15:35:29.515986 [FINE] [YamuxStream] [3][Server] StreamID=1 Direct write: Successfully wrote all 16 bytes in 1ms
2026-02-02T15:35:29.515986 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/ipfs/id/1.0.0".
2026-02-02T15:35:29.515986 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/ipfs/id/1.0.0" and its handler.
2026-02-02T15:35:29.515986 [FINE] [multistream] [multistreamMuxer - handle] Protocol /ipfs/id/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:29.515986 [FINE] [StreamScopeImpl] stream-1770068129492-3108: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:29.515986 [FINE] [StreamScopeImpl] stream-1770068129492-3108: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:29.515986 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /ipfs/id/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:35:29.515986 [FINE] [identify] IdentifyService.handleIdentifyRequest: SERVER received identify request from 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom (reported as 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom) on stream 1
2026-02-02T15:35:29.515986 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER ENTRY POINT for peer 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom. IsPush: false. Stream ID: 1
2026-02-02T15:35:29.515986 [FINE] [identify] IdentifyService.sendIdentifyResp: Preparing to send identify response to 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom. IsPush: false. Stream ID: 1
2026-02-02T15:35:29.515986 [FINER] [identify] IdentifyService.sendIdentifyResp: Setting service scope for stream to 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom.
2026-02-02T15:35:29.515986 [FINE] [StreamScopeImpl] stream-1770068129492-3108: Setting service to libp2p.identify for peer 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom, protocol /ipfs/id/1.0.0
2026-02-02T15:35:29.517077 [FINE] [StreamScopeImpl] stream-1770068129492-3108: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:35:29.517077 [FINER] [identify] IdentifyService.sendIdentifyResp: Acquiring current snapshot for 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom.
2026-02-02T15:35:29.517077 [FINE] [identify] IdentifyService.sendIdentifyResp: Sending snapshot to 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom: seq=3, protocols=6, addrs=2
2026-02-02T15:35:29.517077 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Creating base response for peer 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom. Snapshot seq: 3
2026-02-02T15:35:29.517077 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ObservedAddr set to /ip4/127.0.0.1/tcp/58648 for 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:29.517077 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: LocalAddr: /ip4/0.0.0.0/tcp/4102, RemoteAddr: /ip4/127.0.0.1/tcp/58648, ViaLoopback: true for 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:29.517077 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added 2 listen addresses for 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:29.517077 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added public key (36 bytes) for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:29.517077 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ProtocolVersion: ipfs/0.1.0, AgentVersion: dart-libp2p/0.1.0 for 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom
2026-02-02T15:35:29.517077 [FINER] [identify] IdentifyService._getSignedRecord: Attempting to get signed record. DisableSignedPeerRecord: false, Snapshot record type: Future<Envelope?>
2026-02-02T15:35:29.517077 [FINER] [identify] IdentifyService._getSignedRecord: Marshalled signed record successfully (181 bytes).
2026-02-02T15:35:29.518100 [FINER] [identify] IdentifyService.sendIdentifyResp: Added signed peer record (181 bytes) to response for 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom.
2026-02-02T15:35:29.518100 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER About to write identify message to 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom on stream 1 (remote addr: /ip4/127.0.0.1/tcp/58648)
2026-02-02T15:35:29.518100 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Writing to stream 1 for peer 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom. Total message size: 414 bytes. SignedPeerRecord present: true
2026-02-02T15:35:29.518100 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Sending as single delimited message (size 414).
2026-02-02T15:35:29.518100 [FINE] [YamuxStream] [3][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 416 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524252
2026-02-02T15:35:29.518100 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 428, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 160, 158, 3, 10, 36, 8, 1, 18, 32])
2026-02-02T15:35:29.518100 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:35:29.518100 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 444 bytes (plaintext was 428)
2026-02-02T15:35:29.518100 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 446
2026-02-02T15:35:29.518100 [FINER] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Writing 446 bytes: 01bc4cf6b1205bba7ce85b304e791171c581b323cf0d385c8d193f3d7f34592c53fbdeab6dc4d37577f780dde8d56f7a4723e03b8d03d96c8a927108f9f76006d648980fbbda52bed2f17cff701928819568cf442b21420ab23bc4eceb287f55bc2e05ed600ae05a82a812f036f1cffd981b9d666a233ce3a85bbb47a1cd5994e68f02e14380d56539babe00f3d64d8394ddd9b722c2dc81938138650525206ef54c73e582d7a9209c9850f4cbb1ff113c0ad546599ee8065c268b9c385f631235f7466453cc3b0b4d06d4243cd1bfc4d357645965d996153a3937233bd2c821474e421e7bf23a055668d68856af4a13dd980f281d9acec475c74adac90f35d6e03d85ee174a9d4d9664eedad24456ebc7cea8b20d4b9b3fe913d08310746ae7ff0017f626264e97f3c7474bb2dadc089579b34e93a19c5b024d6a6dbe97028e658e8de60c5eebc1a7061825e507491ef6a07d90ab75e0d454cfae08240f93c9725b87e23e6976601ec64a9000ead72183b4278786584857a65a6820f4c134ff48924418b0b2754b118722dcb5851949e7f789ad165692e7df4eb0fb87305d2d85f599554e308c422ceabf007495ed93d3de63fd8d38d6ca75e1ee2d4784
2026-02-02T15:35:29.519122 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:29.519122 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.519122 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.519122 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.519122 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:29.519122 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:29.519122 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:29.519122 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:29.519122 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:29.519122 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(06b01a85) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:29.519122 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(06b01a85) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:29.520138 [FINEST] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002c8e79c9f9f655626082ae0e53ef66757044666a5c0ecc691f5ce61033b8c9a6cc9bdfc49b4248ad3fd16bfb40
2026-02-02T15:35:29.520138 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(69c6a442) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.520138 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(69c6a442) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: 8e79c9f9f655626082ae0e53ef66757044666a5c0ecc691f5ce61033b8c9a6cc9bdfc49b4248ad3fd16bfb40
2026-02-02T15:35:29.520138 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:35:29.520138 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:29.520138 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:35:29.520138 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:35:29.520138 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:35:29.520138 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:35:29.520138 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:35:29.520138 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(68a58ad2) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:35:29.520138 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(68a58ad2) END (from buffer). Returning 44 bytes: 8e79c9f9f655626082ae0e53ef66757044666a5c0ecc691f5ce61033b8c9a6cc9bdfc49b4248ad3fd16bfb40. Buffer after: 0 bytes: 
2026-02-02T15:35:29.520138 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [142, 121, 201, 249]
2026-02-02T15:35:29.520138 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:35:29.520138 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: 8e79c9f9f655626082ae0e53ef66757044666a5c0ecc691f5ce61033b8c9a6cc9bdfc49b4248ad3fd16bfb40
2026-02-02T15:35:29.520138 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:35:29.520138 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:35:29.521479 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 8e79c9f9f655626082ae0e53ef66757044666a5c0ecc691f5ce61033
2026-02-02T15:35:29.521479 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: b8c9a6cc9bdfc49b4248ad3fd16bfb40
2026-02-02T15:35:29.521479 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [142, 121, 201, 249]
2026-02-02T15:35:29.521479 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [184, 201, 166, 204]
2026-02-02T15:35:29.521479 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [184, 201, 166, 204, 155, 223, 196, 155, 66, 72, 173, 63, 209, 107, 251, 64]
2026-02-02T15:35:29.521479 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.521479 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059092378): [123, 172, 0, 48, 102, 157, 66, 1, 3, 57, 3, 255, 65, 52, 168, 8, 119, 249, 134, 62, 185, 239, 164, 240, 154, 247, 193, 40, 242, 201, 230, 59]
2026-02-02T15:35:29.521479 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:35:29.521479 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:35:29.521479 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:35:29.521479 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:29.521479 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.521479 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:35:29.521479 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.521479 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.521479 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.522483 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:35:29.522483 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:35:29.522483 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:29.522483 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:35:29.522483 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.522483 [FINE] [YamuxStream] [2][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:35:29.522483 [FINE] [YamuxStream] [2][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:35:29.522483 [FINE] [YamuxStream] [2][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:35:29.523496 [FINE] [YamuxStream] [2][Client] StreamID=1 setDeadline() set to 2026-02-02T15:35:59.523496
2026-02-02T15:35:29.523496 [FINE] [StreamScopeImpl] stream-1770068129484-6369: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:29.523496 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
2026-02-02T15:35:29.523496 [FINE] [StreamScopeImpl] stream-1770068129484-6369: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:29.523496 [FINE] [identify]  [IDENTIFY-STREAM-READY] peer=12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, stream_id=1, protocol=/ipfs/id/1.0.0
2026-02-02T15:35:29.523496 [FINE] [StreamScopeImpl] stream-1770068129484-6369: Setting service to libp2p.identify for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, protocol /ipfs/id/1.0.0
2026-02-02T15:35:29.523496 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
2026-02-02T15:35:29.523496 [FINE] [StreamScopeImpl] stream-1770068129484-6369: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:35:29.523496 [FINEST] [YamuxStream] [2][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:29.524962 [FINEST] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Flushed 446 bytes successfully. Data preview (hex): 01bc4cf6b1205bba7ce85b304e791171c581b323...
2026-02-02T15:35:29.524962 [FINE] [YamuxStream] [3][Server] StreamID=1 Direct write: Successfully wrote all 416 bytes in 6ms
2026-02-02T15:35:29.524962 [FINE] [identify] IdentifyService._writeChunkedIdentifyMsg: Single message sent to 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom.
2026-02-02T15:35:29.525467 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Identify message written to 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom.
2026-02-02T15:35:29.525467 [FINER] [identify] IdentifyService.sendIdentifyResp: Updating sequence number for connection to 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom.
2026-02-02T15:35:29.525467 [FINER] [identify] IdentifyService.sendIdentifyResp: Updated sequence for 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom to 3.
2026-02-02T15:35:29.525467 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Signalling end of writes (calling stream.closeWrite()) on stream to 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom.
2026-02-02T15:35:29.525467 [FINER] [YamuxStream] [3][Server] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:35:29.525981 [FINER] [YamuxStream] [3][Server] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:35:29.525981 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:29.525981 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:35:29.526493 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:29.526493 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:29.526493 [FINER] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Writing 30 bytes: 001ce6ab83c2f469708b8ffe52558bfd68f462993ec3ba9ee8732faac80c
2026-02-02T15:35:29.526493 [FINEST] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Flushed 30 bytes successfully. Data preview (hex): 001ce6ab83c2f469708b8ffe52558bfd68f46299...
2026-02-02T15:35:29.526493 [FINE] [YamuxStream] [3][Server] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:35:29.526493 [FINE] [YamuxStream] [3][Server] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:35:29.526493 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER stream.closeWrite() completed for 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom. Stream will NOT be fully closed by sendIdentifyResp anymore.
2026-02-02T15:35:29.527497 [FINE] [identify] IdentifyService.sendIdentifyResp: Successfully sent identify response and signalled closeWrite to 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom. IsPush: false.
2026-02-02T15:35:29.527497 [FINEST] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - RAW_SOCKET_DATA_CHUNK_RECV (446 bytes): 01bc4cf6b1205bba7ce85b304e791171c581b323cf0d385c8d193f3d7f34592c53fbdeab6dc4d37577f780dde8d56f7a4723e03b8d03d96c8a927108f9f76006d648980fbbda52bed2f17cff701928819568cf442b21420ab23bc4eceb287f55bc2e05ed600ae05a82a812f036f1cffd981b9d666a233ce3a85bbb47a1cd5994e68f02e14380d56539babe00f3d64d8394ddd9b722c2dc81938138650525206ef54c73e582d7a9209c9850f4cbb1ff113c0ad546599ee8065c268b9c385f631235f7466453cc3b0b4d06d4243cd1bfc4d357645965d996153a3937233bd2c821474e421e7bf23a055668d68856af4a13dd980f281d9acec475c74adac90f35d6e03d85ee174a9d4d9664eedad24456ebc7cea8b20d4b9b3fe913d08310746ae7ff0017f626264e97f3c7474bb2dadc089579b34e93a19c5b024d6a6dbe97028e658e8de60c5eebc1a7061825e507491ef6a07d90ab75e0d454cfae08240f93c9725b87e23e6976601ec64a9000ead72183b4278786584857a65a6820f4c134ff48924418b0b2754b118722dcb5851949e7f789ad165692e7df4eb0fb87305d2d85f599554e308c422ceabf007495ed93d3de63fd8d38d6ca75e1ee2d4784
2026-02-02T15:35:29.527497 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:29.527497 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.528002 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.528002 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.528002 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:29.528002 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:29.528002 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:29.528002 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:29.528002 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:29.528506 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(10d75f78) START. Requested: 2. Buffer: 446 bytes.
2026-02-02T15:35:29.528506 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(10d75f78) END (from buffer). Returning 2 bytes: 01bc. Buffer after: 444 bytes: 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
2026-02-02T15:35:29.528506 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [1, 188]
2026-02-02T15:35:29.528506 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:29.528506 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [1, 188]
2026-02-02T15:35:29.528506 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 01bc
2026-02-02T15:35:29.528506 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 444
2026-02-02T15:35:29.528506 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 444
2026-02-02T15:35:29.528506 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 444 more bytes (have 0/444)
2026-02-02T15:35:29.528506 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(70b1a1ef) START. Requested: 444. Buffer: 444 bytes.
2026-02-02T15:35:29.528506 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(70b1a1ef) END (from buffer). Returning 444 bytes: 4cf6b1205bba7ce85b304e791171c581b323cf0d385c8d193f3d7f34592c53fbdeab6dc4d37577f780dde8d56f7a4723e03b8d03d96c8a927108f9f76006d648980fbbda52bed2f17cff701928819568cf442b21420ab23bc4eceb287f55bc2e05ed600ae05a82a812f036f1cffd981b9d666a233ce3a85bbb47a1cd5994e68f02e14380d56539babe00f3d64d8394ddd9b722c2dc81938138650525206ef54c73e582d7a9209c9850f4cbb1ff113c0ad546599ee8065c268b9c385f631235f7466453cc3b0b4d06d4243cd1bfc4d357645965d996153a3937233bd2c821474e421e7bf23a055668d68856af4a13dd980f281d9acec475c74adac90f35d6e03d85ee174a9d4d9664eedad24456ebc7cea8b20d4b9b3fe913d08310746ae7ff0017f626264e97f3c7474bb2dadc089579b34e93a19c5b024d6a6dbe97028e658e8de60c5eebc1a7061825e507491ef6a07d90ab75e0d454cfae08240f93c9725b87e23e6976601ec64a9000ead72183b4278786584857a65a6820f4c134ff48924418b0b2754b118722dcb5851949e7f789ad165692e7df4eb0fb87305d2d85f599554e308c422ceabf007495ed93d3de63fd8d38d6ca75e1ee2d4784. Buffer after: 0 bytes: 
2026-02-02T15:35:29.529518 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 444 bytes. First 4 bytes: [76, 246, 177, 32]
2026-02-02T15:35:29.529518 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 444, Got: 444
2026-02-02T15:35:29.529518 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 444, Bytes: 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
2026-02-02T15:35:29.529518 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 444
2026-02-02T15:35:29.529518 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(428) and MAC(16)
2026-02-02T15:35:29.529518 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 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
2026-02-02T15:35:29.529518 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: ed93d3de63fd8d38d6ca75e1ee2d4784
2026-02-02T15:35:29.529518 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [76, 246, 177, 32]
2026-02-02T15:35:29.529518 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [237, 147, 211, 222]
2026-02-02T15:35:29.529518 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [237, 147, 211, 222, 99, 253, 141, 56, 214, 202, 117, 225, 238, 45, 71, 132]
2026-02-02T15:35:29.530517 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.530517 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059092378): [123, 172, 0, 48, 102, 157, 66, 1, 3, 57, 3, 255, 65, 52, 168, 8, 119, 249, 134, 62, 185, 239, 164, 240, 154, 247, 193, 40, 242, 201, 230, 59]
2026-02-02T15:35:29.530517 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 428 bytes
2026-02-02T15:35:29.530517 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 428 bytes to _decryptedBuffer. New _decryptedBuffer.length: 428
2026-02-02T15:35:29.530517 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 416. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 160]
2026-02-02T15:35:29.530517 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:29.530517 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.530517 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=416
2026-02-02T15:35:29.531517 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.531517 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.531517 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.531517 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=416
2026-02-02T15:35:29.531517 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 416, _decryptedBuffer.length: 416
2026-02-02T15:35:29.531517 [FINER] [SecuredConnection] SecuredConnection.read (length=416): Returning 416 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [158, 3, 10, 36, 8, 1, 18, 32, 211, 0, 134, 82, 217, 167, 171, 89, 31, 66, 181, 252]
2026-02-02T15:35:29.531517 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=416
2026-02-02T15:35:29.531517 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.531517 [FINE] [YamuxStream] [2][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 416, flags: 0
2026-02-02T15:35:29.532517 [FINE] [YamuxStream] [2][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 416 bytes directly to waiting reader
2026-02-02T15:35:29.532517 [FINE] [YamuxStream] [2][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 452
2026-02-02T15:35:29.532963 [FINE] [identify]  [READ-ALL-ID-MESSAGES] Parsed identify from peer=12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, 414 bytes, duration=9ms
2026-02-02T15:35:29.532963 [FINE] [identify] IdentifyService._consumeMessage: Consuming identify message from 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. IsPush: false.
2026-02-02T15:35:29.532963 [FINER] [identify] IdentifyService._consumeMessage: Current known protocols for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: 0
2026-02-02T15:35:29.532963 [FINER] [identify] IdentifyService._consumeMessage: Received protocols from 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: 6
2026-02-02T15:35:29.532963 [FINER] [identify] IdentifyService._diff: Calculating protocol diff. Before: 0, After: 6
2026-02-02T15:35:29.532963 [FINER] [identify] IdentifyService._diff: Added: 6, Removed: 0
2026-02-02T15:35:29.532963 [FINE] [identify] IdentifyService._consumeMessage: For peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw - Added protocols: 6, Removed protocols: 0
2026-02-02T15:35:29.533969 [FINE] [identify] IdentifyService._consumeMessage: Parsed observed address for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: /ip4/127.0.0.1/tcp/58648
2026-02-02T15:35:29.533969 [FINE] [identify] IdentifyService._consumeMessage: Recording observed address /ip4/127.0.0.1/tcp/58648 for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw via conn 0.
2026-02-02T15:35:29.533969 [FINER] [identify] IdentifyService._consumeMessage: Processing 2 listen addresses from 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:29.533969 [FINE] [identify] IdentifyService._consumeMessage: Parsed 2 listen addresses for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:29.533969 [FINER] [identify] IdentifyService._consumeMessage: Attempting to parse signed peer record for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw (181 bytes).
2026-02-02T15:35:29.533969 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Checking for signed peer record.
2026-02-02T15:35:29.533969 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Attempting to consume envelope from 181 bytes.
2026-02-02T15:35:29.540549 [FINE] [identify] IdentifyService.signedPeerRecordFromMessage: Successfully consumed envelope.
2026-02-02T15:35:29.541054 [FINE] [identify] IdentifyService._consumeMessage: Parsed signed peer record for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: true
2026-02-02T15:35:29.541054 [FINER] [identify] IdentifyService._consumeMessage: Connectedness for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: Connectedness.connected. Default TTL: 4:00:00.000000
2026-02-02T15:35:29.541054 [FINER] [identify] IdentifyService._consumeMessage: Peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw is connected/limited, using TTL: 875976:00:00.000000
2026-02-02T15:35:29.541570 [FINER] [identify] IdentifyService._consumeMessage: Updating address book for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. Current TTLs: RecentlyConnectedAddrTTL=4:00:00.000000, ConnectedAddrTTL=875976:00:00.000000, TempAddrTTL=0:02:00.000000.
2026-02-02T15:35:29.541570 [FINER] [identify] IdentifyService._consumeMessage: Consuming signed peer record for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:29.541570 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Consuming signed record for peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:29.541570 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Derived PeerId 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw from record public key for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:29.541570 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Obtained record from envelope for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:29.541570 [FINE] [identify] IdentifyService._consumeSignedPeerRecord: Successfully consumed signed peer record for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. Found 2 addresses.
2026-02-02T15:35:29.541570 [FINE] [identify] IdentifyService._consumeMessage: Addresses from signed peer record for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: 2
2026-02-02T15:35:29.541570 [FINER] [identify] IdentifyService._consumeMessage: Filtering addresses for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw based on remote connection address /ip4/127.0.0.1/tcp/4102. Before filter: 2
2026-02-02T15:35:29.543084 [FINER] [identify] IdentifyService._filterAddrs: Filtering 2 addresses based on remote address type: /ip4/127.0.0.1/tcp/4102 (Loopback: true, Private: false, Public: false)
2026-02-02T15:35:29.543084 [FINER] [identify] IdentifyService._filterAddrs: Remote is loopback, returning all addresses.
2026-02-02T15:35:29.543084 [FINER] [identify] IdentifyService._consumeMessage: After filter for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: 2
2026-02-02T15:35:29.543084 [FINE] [identify] IdentifyService._consumeMessage: Adding 2 addresses for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw to peerstore with TTL 875976:00:00.000000.
2026-02-02T15:35:29.543084 [FINER] [identify] IdentifyService._consumeMessage: Updating TempAddrTTL to zero for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:29.544098 [FINE] [identify] IdentifyService._consumeMessage: Storing metadata for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: ProtocolVersion=ipfs/0.1.0, AgentVersion=dart-libp2p/0.1.0
2026-02-02T15:35:29.544098 [FINER] [identify] IdentifyService._consumeMessage: Consuming received public key for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:29.544098 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Consuming public key for remote peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw from local peer 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom.
2026-02-02T15:35:29.544098 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Received 36 bytes for public key of 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:29.544098 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Successfully unmarshalled public key for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:29.545100 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw from received public key for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:29.545100 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw matches expected remote peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:29.545605 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Existing public key found for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw. Comparing with received key.
2026-02-02T15:35:29.546109 [FINE] [identify] IdentifyService._consumeReceivedPubKey: Received public key for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw matches existing key in peerstore.
2026-02-02T15:35:29.546109 [FINE] [identify] IdentifyService._consumeMessage: Finished consuming message from 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw.
2026-02-02T15:35:29.546109 [FINER] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Checking push support for 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw in peerstore.
2026-02-02T15:35:29.547124 [FINE] [autonatv2] Peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw identification completed, updating peer map
2026-02-02T15:35:29.547124 [FINE] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw supports push.
2026-02-02T15:35:29.547681 [FINER] [YamuxStream] [2][Client] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:35:29.547681 [FINER] [YamuxStream] [2][Client] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:35:29.547681 [FINE] [autonatv2] Updating peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: protocols=[/ipfs/id/1.0.0, /ipfs/id/push/1.0.0, /ipfs/ping/1.0.0, /libp2p/autonat/2/dial-back, /libp2p/autonat/2/dial-request, /libp2p/dcutr], connectedness=Connectedness.connected
2026-02-02T15:35:29.548696 [FINE] [autonatv2] Adding peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw to AutoNAT v2 peer map (supports /libp2p/autonat/2/dial-request)
2026-02-02T15:35:29.548696 [FINE] [ambient_autonat_v2] Peer 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw supports AutoNAT v2, scheduling probe
2026-02-02T15:35:29.548696 [FINE] [ambient_autonat_v2] Scheduling probe in 2s (force: true, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:29.548696 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:29.548696 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:35:29.550698 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:29.550698 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:29.550698 [FINER] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Writing 30 bytes: 001c0e4c5e25753c00631f6e83b388457dc18efabaa6013877abcca69406
2026-02-02T15:35:29.550698 [FINEST] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Flushed 30 bytes successfully. Data preview (hex): 001c0e4c5e25753c00631f6e83b388457dc18efa...
2026-02-02T15:35:29.551700 [FINE] [YamuxStream] [2][Client] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:35:29.552206 [FINE] [YamuxStream] [2][Client] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:35:29.552206 [FINE] [identify]  [SPAWN-IDENTIFY-SUCCESS] Identify succeeded for peer=12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw, duration=82ms
2026-02-02T15:35:29.553220 [FINE] [Libp2pRouter] [DEBUG] Connected to peer 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN
2026-02-02T15:35:29.553220 [FINEST] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001ce6ab83c2f469708b8ffe52558bfd68f462993ec3ba9ee8732faac80c
2026-02-02T15:35:29.553220 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:29.553880 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.553880 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.553880 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.553880 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:29.553880 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:29.553880 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:29.554386 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:29.554386 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:29.554386 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(308f5cb2) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:29.554386 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(308f5cb2) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: e6ab83c2f469708b8ffe52558bfd68f462993ec3ba9ee8732faac80c
2026-02-02T15:35:29.554386 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:29.554386 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:29.554386 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:29.554386 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:29.554386 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:29.554386 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:29.554386 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:29.554386 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(694ea6af) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:29.554386 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(694ea6af) END (from buffer). Returning 28 bytes: e6ab83c2f469708b8ffe52558bfd68f462993ec3ba9ee8732faac80c. Buffer after: 0 bytes: 
2026-02-02T15:35:29.555426 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [230, 171, 131, 194]
2026-02-02T15:35:29.555426 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:29.555426 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: e6ab83c2f469708b8ffe52558bfd68f462993ec3ba9ee8732faac80c
2026-02-02T15:35:29.555426 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:29.555426 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:29.555426 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: e6ab83c2f469708b8ffe5255
2026-02-02T15:35:29.555426 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 8bfd68f462993ec3ba9ee8732faac80c
2026-02-02T15:35:29.555942 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [230, 171, 131, 194]
2026-02-02T15:35:29.555942 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [139, 253, 104, 244]
2026-02-02T15:35:29.555942 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [139, 253, 104, 244, 98, 153, 62, 195, 186, 158, 232, 115, 47, 170, 200, 12]
2026-02-02T15:35:29.555942 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.555942 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059092378): [123, 172, 0, 48, 102, 157, 66, 1, 3, 57, 3, 255, 65, 52, 168, 8, 119, 249, 134, 62, 185, 239, 164, 240, 154, 247, 193, 40, 242, 201, 230, 59]
2026-02-02T15:35:29.556948 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:35:29.556948 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:29.557454 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:29.557454 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:29.558462 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.558462 [FINE] [YamuxStream] [2][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:29.558462 [FINE] [YamuxStream] [2][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:35:29.559460 [FINE] [YamuxStream] [2][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:35:29.559460 [FINEST] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c0e4c5e25753c00631f6e83b388457dc18efabaa6013877abcca69406
2026-02-02T15:35:29.559460 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(06b01a85) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.559460 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(06b01a85) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 0e4c5e25753c00631f6e83b388457dc18efabaa6013877abcca69406
2026-02-02T15:35:29.559460 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:29.560466 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:29.560466 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:29.560466 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:29.560466 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:29.560466 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:29.560466 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:29.560466 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(cfa6355d) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:29.560466 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(cfa6355d) END (from buffer). Returning 28 bytes: 0e4c5e25753c00631f6e83b388457dc18efabaa6013877abcca69406. Buffer after: 0 bytes: 
2026-02-02T15:35:29.560466 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [14, 76, 94, 37]
2026-02-02T15:35:29.560466 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:29.560466 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 0e4c5e25753c00631f6e83b388457dc18efabaa6013877abcca69406
2026-02-02T15:35:29.560466 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:29.560466 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:29.561465 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 0e4c5e25753c00631f6e83b3
2026-02-02T15:35:29.561465 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 88457dc18efabaa6013877abcca69406
2026-02-02T15:35:29.561465 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [14, 76, 94, 37]
2026-02-02T15:35:29.561465 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [136, 69, 125, 193]
2026-02-02T15:35:29.561465 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [136, 69, 125, 193, 142, 250, 186, 166, 1, 56, 119, 171, 204, 166, 148, 6]
2026-02-02T15:35:29.561465 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.562465 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061664014): [57, 249, 251, 229, 147, 246, 6, 238, 57, 181, 19, 200, 113, 158, 245, 228, 64, 209, 84, 76, 254, 4, 151, 31, 111, 192, 249, 94, 65, 178, 30, 104]
2026-02-02T15:35:29.562465 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 12 bytes
2026-02-02T15:35:29.563464 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:29.563464 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:29.563464 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:29.563464 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.563464 [FINE] [YamuxStream] [3][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:29.563464 [FINE] [YamuxStream] [3][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:35:29.563464 [FINE] [YamuxStream] [3][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:35:29.563464 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:29.563464 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.563464 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.563464 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.563464 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:29.564463 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:29.564463 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:29.564463 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:29.564463 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:29.564463 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(b26e4174) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:29.564463 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(b26e4174) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:29.564463 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:29.564463 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:29.564463 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:29.564463 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:29.564463 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:29.564463 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:29.564463 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:29.564463 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:29.565463 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:29.565463 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(a317ba2b) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:29.565463 [FINER] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Read(a317ba2b) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:29.951680 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
2026-02-02T15:35:29.952707 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4102 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

2026-02-02T15:35:29.953706 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4102: ServerSocket closed.
2026-02-02T15:35:29.953706 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/4102 connectionStream is done. Removing listener.
2026-02-02T15:35:29.953706 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4102 already closed.
2026-02-02T15:35:29.953706 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4102: ConnectionController closed.
2026-02-02T15:35:29.954706 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw
2026-02-02T15:35:29.954706 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.954706 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:35:29.954706 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:29.955706 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:29.955706 [FINER] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Writing 30 bytes: 001c433a7cd60f5f081aad94810b28ec17ad88f03925f42642007a9101a6
2026-02-02T15:35:29.956211 [FINEST] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c433a7cd60f5f081aad94810b28ec17ad88f03925f42642007a9101a6
2026-02-02T15:35:29.956211 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(b26e4174) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:29.956211 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(b26e4174) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 433a7cd60f5f081aad94810b28ec17ad88f03925f42642007a9101a6
2026-02-02T15:35:29.956211 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:29.956211 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:29.956211 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:29.956211 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:29.956211 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:29.956211 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:29.957217 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:29.957217 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(9d568a73) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:29.957217 [FINER] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Read(9d568a73) END (from buffer). Returning 28 bytes: 433a7cd60f5f081aad94810b28ec17ad88f03925f42642007a9101a6. Buffer after: 0 bytes: 
2026-02-02T15:35:29.957733 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [67, 58, 124, 214]
2026-02-02T15:35:29.957733 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:29.957733 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 433a7cd60f5f081aad94810b28ec17ad88f03925f42642007a9101a6
2026-02-02T15:35:29.957733 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:29.957733 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:29.957733 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 433a7cd60f5f081aad94810b
2026-02-02T15:35:29.957733 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 28ec17ad88f03925f42642007a9101a6
2026-02-02T15:35:29.957733 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [67, 58, 124, 214]
2026-02-02T15:35:29.957733 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [40, 236, 23, 173]
2026-02-02T15:35:29.957733 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [40, 236, 23, 173, 136, 240, 57, 37, 244, 38, 66, 0, 122, 145, 1, 166]
2026-02-02T15:35:29.957733 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.957733 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059092378): [123, 172, 0, 48, 102, 157, 66, 1, 3, 57, 3, 255, 65, 52, 168, 8, 119, 249, 134, 62, 185, 239, 164, 240, 154, 247, 193, 40, 242, 201, 230, 59]
2026-02-02T15:35:29.958750 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:35:29.958750 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:29.958750 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]
2026-02-02T15:35:29.958750 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:29.958750 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.958750 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:29.958750 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:35:29.958750 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:29.958750 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:29.958750 [FINER] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Writing 30 bytes: 001c87dccb50e0a74b4e1b1730a660cfb256fe7e08b7549bcb57424336d1
2026-02-02T15:35:29.959750 [FINEST] [TCPConnection] TCPConnection.write (id: 30bf015d-a9e7-4ec1-95d1-1b0d699658e4): Flushed 30 bytes successfully. Data preview (hex): 001c87dccb50e0a74b4e1b1730a660cfb256fe7e...
2026-02-02T15:35:29.959750 [FINE] [YamuxStream] [2][Client] StreamID=1 forceReset() called. Current state: YamuxStreamState.closing
2026-02-02T15:35:29.959750 [FINER] [YamuxStream] [2][Client] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.reset
2026-02-02T15:35:29.959750 [FINER] [YamuxStream] [2][Client] StreamID=1 _cleanup() - state set to: YamuxStreamState.reset (was YamuxStreamState.reset)
2026-02-02T15:35:29.959750 [FINER] [YamuxStream] [2][Client] StreamID=1 _cleanup() closing incomingController.
2026-02-02T15:35:29.959750 [FINE] [YamuxStream] [2][Client] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.reset
2026-02-02T15:35:29.959750 [FINE] [YamuxStream] [2][Client] StreamID=1 forceReset() completed. Final state: YamuxStreamState.reset
2026-02-02T15:35:29.960749 [WARNING] [Swarm] Error in acceptStream loop for conn 0 to 12D3KooWQ22f4hBLJ7fzHvG8P9x8DEE9jVXmEFCqcjd2dj1YqLXw: Bad state: Session closed while waiting for stream. Loop terminating.
2026-02-02T15:35:29.960749 [FINE] [SwarmStream] Closing stream 1
2026-02-02T15:35:29.960749 [FINE] [YamuxStream] [2][Client] StreamID=1 close() called. Current state: YamuxStreamState.reset
2026-02-02T15:35:29.960749 [FINER] [YamuxStream] [2][Client] StreamID=1 close() called but stream already closed/reset. State: YamuxStreamState.reset. Doing nothing.
2026-02-02T15:35:29.961255 [FINE] [SwarmStream] Stream 1: Cleaning up management scope
2026-02-02T15:35:29.961255 [FINE] [SwarmStream] Stream 1 closed
2026-02-02T15:35:29.961255 [FINE] [TCPConnection] TCPConnection(30bf015d-a9e7-4ec1-95d1-1b0d699658e4) - Connection closed.
2026-02-02T15:35:29.961255 [FINEST] [TCPConnection] TCPConnection.write (id: d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5): Flushed 30 bytes successfully. Data preview (hex): 001c433a7cd60f5f081aad94810b28ec17ad88f0...
2026-02-02T15:35:29.961255 [FINE] [YamuxStream] [3][Server] StreamID=1 forceReset() called. Current state: YamuxStreamState.closing
2026-02-02T15:35:29.961255 [FINER] [YamuxStream] [3][Server] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.reset
2026-02-02T15:35:29.961255 [FINER] [YamuxStream] [3][Server] StreamID=1 _cleanup() - state set to: YamuxStreamState.reset (was YamuxStreamState.reset)
2026-02-02T15:35:29.961255 [FINER] [YamuxStream] [3][Server] StreamID=1 _cleanup() closing incomingController.
2026-02-02T15:35:29.961255 [FINE] [YamuxStream] [3][Server] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.reset
2026-02-02T15:35:29.962258 [FINE] [YamuxStream] [3][Server] StreamID=1 forceReset() completed. Final state: YamuxStreamState.reset
2026-02-02T15:35:29.962258 [FINE] [Swarm] AcceptStream loop for conn 1 to 12D3KooWQbeaoAqXL3vcKBYLC6thUSCb2sFBPiXWZGbPQ8RWutom terminated due to connection closure.
2026-02-02T15:35:29.963259 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Error in _readAndDecryptMessage: Bad state: Connection closed while a read was pending. Current _decryptedBuffer.length: 0
2026-02-02T15:35:29.963259 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:29.963259 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:29.963764 [FINE] [TCPConnection] TCPConnection(d4be0fdd-4a56-4efe-a930-5bb5a4bc0ae5) - Connection closed.
2026-02-02T15:35:30.059923 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /test/1.0.0
2026-02-02T15:35:30.060921 [FINE] [Libp2pRouter] [VERBOSE] Sending message to 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN via protocol /test/1.0.0
2026-02-02T15:35:30.063849 [WARNING] [basichost] 🎯 [newStream] ENTERED for peer 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN, protocols: [/test/1.0.0]
2026-02-02T15:35:30.065354 [WARNING] [basichost] 🎯 [newStream Phase 1] Connecting to peer 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN...
2026-02-02T15:35:30.065354 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:30.065354 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN, Host hashCode: 562629793
2026-02-02T15:35:30.065354 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:30.065354 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:30.065354 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:30.065354 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN
2026-02-02T15:35:30.065354 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN, existing_conns=1
2026-02-02T15:35:30.066370 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN"
2026-02-02T15:35:30.066370 [FINE] [Swarm] Found 0 existing connections for peer ID string: "12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN"
2026-02-02T15:35:30.085929 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN. Dialing.
2026-02-02T15:35:30.087930 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=4, addrs=0, protocols=7
2026-02-02T15:35:30.096926 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:30.100924 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:30.102923 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:30.112921 [FINE] [Swarm] Dialing 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
01:00 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:30.130915 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4602. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4602 for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.131915 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4602 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4602
2026-02-02T15:35:30.134913 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4602. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4602] for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.136913 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.153907 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4602 for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2. This should be resolved to concrete addresses by the host.
2026-02-02T15:35:30.158906 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.163908 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4602
2026-02-02T15:35:30.164907 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:30.164907 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.164907 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.164907 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.164907 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.165907 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.165907 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.165907 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:30.165907 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.165907 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.167906 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:35:30.181409 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:30.181409 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4602
2026-02-02T15:35:30.181409 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4602
2026-02-02T15:35:30.181409 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.182409 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:35:30.182409 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:30.182409 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - resolvedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:35:30.182409 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:35:30.182409 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:35:30.182409 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - Returning: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602]
01:00 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:30.201213 [FINE] [HappyEyeballsDialer] Attempting /ip4/127.0.0.1/tcp/4102 (priority 1)
2026-02-02T15:35:30.201213 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN at /ip4/127.0.0.1/tcp/4102
01:01 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:30.232605 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:30.233941 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.234945 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 246822824, network.listenAddresses: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.237573 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:30.237573 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2, Host hashCode: 682280892
2026-02-02T15:35:30.238587 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.238587 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.238587 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:35:30.238587 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:30.238587 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4602
2026-02-02T15:35:30.238587 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4602
2026-02-02T15:35:30.238587 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.238587 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:35:30.240093 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:30.240093 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - resolvedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:35:30.241097 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:35:30.241097 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:35:30.241601 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - Returning: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602]
2026-02-02T15:35:30.241601 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.241601 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:30.241601 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:30.241601 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2, Host hashCode: 682280892
2026-02-02T15:35:30.242606 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.242606 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.242606 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:35:30.242606 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:30.242606 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4602
2026-02-02T15:35:30.242606 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4602
2026-02-02T15:35:30.242606 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.242606 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:35:30.242606 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:30.242606 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - resolvedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:35:30.244119 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:35:30.244119 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:35:30.244119 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - Returning: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602]
2026-02-02T15:35:30.244119 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.246642 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:30.246642 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:30.247642 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:30.248147 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.248147 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 246822824, network.listenAddresses: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.248147 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.248147 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 246822824, network.listenAddresses: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.249152 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.249152 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:30.249152 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2, Host hashCode: 682280892
2026-02-02T15:35:30.250156 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.250156 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.250156 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:35:30.250156 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:30.250156 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4602
2026-02-02T15:35:30.251661 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4602
2026-02-02T15:35:30.251661 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.251661 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:35:30.252678 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:30.252678 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - resolvedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:35:30.252678 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:35:30.252678 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:35:30.252678 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - Returning: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602]
2026-02-02T15:35:30.253679 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.253679 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.254183 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.254183 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 246822824, network.listenAddresses: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.254183 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:30.254183 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.254183 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 246822824, network.listenAddresses: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.254697 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:35:30.254697 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:30.254697 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4602 with ID: 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.255209 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:30.255209 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /test/request/1.0.0
2026-02-02T15:35:30.255209 [FINE] [Libp2pRouter] [DEBUG] Connecting to /ip4/127.0.0.1/tcp/4602/p2p/12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.257224 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:30.257224 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2, Host hashCode: 682280892
2026-02-02T15:35:30.257224 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.257224 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.257224 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:35:30.258230 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:30.258230 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4602
2026-02-02T15:35:30.258230 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4602 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4602
2026-02-02T15:35:30.258736 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4602]
2026-02-02T15:35:30.258736 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4602 (first component not IP)
2026-02-02T15:35:30.258736 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:30.258736 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - resolvedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:35:30.258736 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:35:30.258736 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602}
2026-02-02T15:35:30.258736 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - Returning: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602]
2026-02-02T15:35:30.259607 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4602, /ip4/172.29.112.1/tcp/4602] for host 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.259607 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2, existing_conns=0
2026-02-02T15:35:30.259607 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2"
2026-02-02T15:35:30.260614 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:30.260614 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:30.260614 [FINE] [Swarm] Found 0 existing connections for peer ID string: "12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2"
2026-02-02T15:35:30.260614 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2. Dialing.
2026-02-02T15:35:30.261512 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:30.261512 [FINE] [Swarm] Dialing 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:30.261512 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:35:30.261512 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:30.261512 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:30.261512 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=4, addrs=2, protocols=7
2026-02-02T15:35:30.262517 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:30.262517 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:30.281623 [FINE] [HappyEyeballsDialer] Attempting /ip4/127.0.0.1/tcp/4602 (priority 1)
2026-02-02T15:35:30.281623 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 at /ip4/127.0.0.1/tcp/4602
2026-02-02T15:35:30.287719 [FINE] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) CREATED. IsServer: true, Direction: Direction.inbound. Socket Local: 0.0.0.0:4602, Socket Remote: 127.0.0.1:58650
2026-02-02T15:35:30.287719 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068130287-4586
2026-02-02T15:35:30.288224 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:30.288224 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(436ff8e0) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:30.288224 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(436ff8e0) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:30.297764 [FINE] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) CREATED. IsServer: false, Direction: Direction.outbound. Socket Local: 127.0.0.1:58650, Socket Remote: 127.0.0.1:4602
2026-02-02T15:35:30.298764 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068130298-2653
2026-02-02T15:35:30.298764 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWBz52D6k9xfq6jkoqYu9A6Sb1BGK84BcnZmxCLz7sxjRh
2026-02-02T15:35:30.298764 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:30.298764 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:35:30.299764 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(64f72c95) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:30.299764 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(64f72c95) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:30.299764 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:30.299764 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(436ff8e0) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.303762 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(436ff8e0) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:35:30.304762 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:30.304762 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:30.304762 [FINER] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:30.304762 [FINEST] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:35:30.305761 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:30.305761 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:30.306761 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(7ebf40be) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:30.306761 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(7ebf40be) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:30.307761 [FINEST] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:30.307761 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(64f72c95) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.307761 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(64f72c95) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:35:30.308760 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:35:30.313758 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:35:30.313758 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(dccaca59) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:30.314759 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(dccaca59) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:30.319756 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:35:30.320756 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(7ebf40be) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.320756 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(7ebf40be) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:35:30.321755 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/noise"
2026-02-02T15:35:30.321755 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/noise"
2026-02-02T15:35:30.322755 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/noise". Sending acknowledgment: "/noise".
2026-02-02T15:35:30.324755 [FINER] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:35:30.417732 [FINEST] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:35:30.465095 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/noise".
2026-02-02T15:35:30.542110 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/noise" and its handler.
2026-02-02T15:35:30.549546 [FINE] [multistream] [multistreamMuxer - handle] Protocol /noise negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:30.549546 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /noise on stream scope and stream. Proceeding to call handler.
2026-02-02T15:35:30.554549 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(fa57d933) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:30.554549 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(fa57d933) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:30.555070 [FINEST] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:35:30.555070 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(dccaca59) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.555070 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(dccaca59) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:35:30.558748 [INFO] [NoiseProtocol] secureOutbound: Writing msg1 (e): 32 bytes
2026-02-02T15:35:30.558748 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 34 bytes: 0020c9ae20f09d047a77fca03bd588eee8b8f715e71d816c45fa2a57bf8fb372f376
2026-02-02T15:35:30.558748 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 34 bytes successfully. Data preview (hex): 0020c9ae20f09d047a77fca03bd588eee8b8f715...
2026-02-02T15:35:30.558748 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(b57ff3f2) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:30.558748 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(b57ff3f2) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:30.559748 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (34 bytes): 0020c9ae20f09d047a77fca03bd588eee8b8f715e71d816c45fa2a57bf8fb372f376
2026-02-02T15:35:30.560747 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(fa57d933) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.560747 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(fa57d933) END (from buffer). Returning 2 bytes: 0020. Buffer after: 32 bytes: c9ae20f09d047a77fca03bd588eee8b8f715e71d816c45fa2a57bf8fb372f376
2026-02-02T15:35:30.560747 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(fbf266ab) START. Requested: 32. Buffer: 32 bytes.
2026-02-02T15:35:30.560747 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(fbf266ab) END (from buffer). Returning 32 bytes: c9ae20f09d047a77fca03bd588eee8b8f715e71d816c45fa2a57bf8fb372f376. Buffer after: 0 bytes: 
2026-02-02T15:35:30.560747 [INFO] [NoiseProtocol] secureInbound: Read msg1 (e): 32 bytes
2026-02-02T15:35:30.575195 [INFO] [NoiseProtocol] secureInbound: Writing msg2 (e,ee,s,es + payload): 200 bytes
2026-02-02T15:35:30.575701 [FINER] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Writing 202 bytes: 00c8f14bc95f4517d1a44a511b95e01fdd20f47fd1a26996d3a70f8be508bfc6de5a063c11e5221546231140d6946c38643ba7ed2258def238a8a5485776f392ef6d73e86009ec595aa25fd21bed9009daffa2bc39f4d2ba85dab0f1e7a30af6f5379067d123deeb6e60d15315e7c429346e9dce8f8c6ce74e70692746e318fd3745bcdadca7448eb3abf08f7d3afaa00758f50487382e71e3935003278158e66c8dd17967784c2a44a58e5fa9eb5673d799b33d700cc7ace5768b18f55d0ac0a4200fef7798f8e938a3
2026-02-02T15:35:30.576214 [FINEST] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Flushed 202 bytes successfully. Data preview (hex): 00c8f14bc95f4517d1a44a511b95e01fdd20f47f...
2026-02-02T15:35:30.576214 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(504ea808) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:30.576214 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(504ea808) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:30.577218 [FINEST] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - RAW_SOCKET_DATA_CHUNK_RECV (202 bytes): 00c8f14bc95f4517d1a44a511b95e01fdd20f47fd1a26996d3a70f8be508bfc6de5a063c11e5221546231140d6946c38643ba7ed2258def238a8a5485776f392ef6d73e86009ec595aa25fd21bed9009daffa2bc39f4d2ba85dab0f1e7a30af6f5379067d123deeb6e60d15315e7c429346e9dce8f8c6ce74e70692746e318fd3745bcdadca7448eb3abf08f7d3afaa00758f50487382e71e3935003278158e66c8dd17967784c2a44a58e5fa9eb5673d799b33d700cc7ace5768b18f55d0ac0a4200fef7798f8e938a3
2026-02-02T15:35:30.577218 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(b57ff3f2) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.578217 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(b57ff3f2) END (from buffer). Returning 2 bytes: 00c8. Buffer after: 200 bytes: f14bc95f4517d1a44a511b95e01fdd20f47fd1a26996d3a70f8be508bfc6de5a063c11e5221546231140d6946c38643ba7ed2258def238a8a5485776f392ef6d73e86009ec595aa25fd21bed9009daffa2bc39f4d2ba85dab0f1e7a30af6f5379067d123deeb6e60d15315e7c429346e9dce8f8c6ce74e70692746e318fd3745bcdadca7448eb3abf08f7d3afaa00758f50487382e71e3935003278158e66c8dd17967784c2a44a58e5fa9eb5673d799b33d700cc7ace5768b18f55d0ac0a4200fef7798f8e938a3
2026-02-02T15:35:30.578217 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(b287f5eb) START. Requested: 200. Buffer: 200 bytes.
2026-02-02T15:35:30.578217 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(b287f5eb) END (from buffer). Returning 200 bytes: f14bc95f4517d1a44a511b95e01fdd20f47fd1a26996d3a70f8be508bfc6de5a063c11e5221546231140d6946c38643ba7ed2258def238a8a5485776f392ef6d73e86009ec595aa25fd21bed9009daffa2bc39f4d2ba85dab0f1e7a30af6f5379067d123deeb6e60d15315e7c429346e9dce8f8c6ce74e70692746e318fd3745bcdadca7448eb3abf08f7d3afaa00758f50487382e71e3935003278158e66c8dd17967784c2a44a58e5fa9eb5673d799b33d700cc7ace5768b18f55d0ac0a4200fef7798f8e938a3. Buffer after: 0 bytes: 
2026-02-02T15:35:30.578217 [INFO] [NoiseProtocol] secureOutbound: Read msg2: 200 bytes
2026-02-02T15:35:30.603408 [INFO] [NoiseProtocol] secureOutbound: Writing msg3 (s,se + payload): 168 bytes
2026-02-02T15:35:30.604412 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 170 bytes: 00a8c5b39179e755012bd785c6a4328384933b7e7a4c84248d46ed113010051592e9e5ccb6298150ea9b0164bbcd4a8eebad875c77ca037abc140687260b08cf6b87d6b8ce0a3c090d690e50491d34a1d802f576a35440605adaee1f16f4512589620999bf2e65fc1194ea28141cfc63e7b9cc4dfc75f8633e3d3cdbc98f0b16f76d212b4658a79d0b70c47985436ced6ebb31192a1770ac4fcab9b64668f37dda91d31ea231fbd5f077
2026-02-02T15:35:30.605923 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 170 bytes successfully. Data preview (hex): 00a8c5b39179e755012bd785c6a4328384933b7e...
2026-02-02T15:35:30.606928 [INFO] [NoiseProtocol] secureOutbound: Handshake complete. Remote peer: 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.606928 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:35:30.606928 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1063415391
2026-02-02T15:35:30.606928 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1061869530
2026-02-02T15:35:30.608927 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:30.608927 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [90, 44, 171, 101, 62, 118, 143, 255, 16, 145, 163, 156, 12, 92, 91, 219, 80, 175, 227, 76, 11, 149, 165, 108, 192, 119, 212, 163, 208, 247, 153, 104]
2026-02-02T15:35:30.608927 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:30.608927 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:35:30.608927 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:35:30.608927 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:35:30.608927 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 38 bytes: 0024aa11d44edcdad3d1712434a377bf7f5b5ec641dc8ea2cd0e62fbec1c138e71f5fb53fcbc
2026-02-02T15:35:30.609927 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 38 bytes successfully. Data preview (hex): 0024aa11d44edcdad3d1712434a377bf7f5b5ec6...
2026-02-02T15:35:30.609927 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:30.609927 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.609927 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.609927 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.610926 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:30.610926 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:30.610926 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:30.610926 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:30.610926 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(46eee04a) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:30.610926 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(46eee04a) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:30.612925 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (170 bytes): 00a8c5b39179e755012bd785c6a4328384933b7e7a4c84248d46ed113010051592e9e5ccb6298150ea9b0164bbcd4a8eebad875c77ca037abc140687260b08cf6b87d6b8ce0a3c090d690e50491d34a1d802f576a35440605adaee1f16f4512589620999bf2e65fc1194ea28141cfc63e7b9cc4dfc75f8633e3d3cdbc98f0b16f76d212b4658a79d0b70c47985436ced6ebb31192a1770ac4fcab9b64668f37dda91d31ea231fbd5f077
2026-02-02T15:35:30.613926 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(504ea808) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.613926 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(504ea808) END (from buffer). Returning 2 bytes: 00a8. Buffer after: 168 bytes: c5b39179e755012bd785c6a4328384933b7e7a4c84248d46ed113010051592e9e5ccb6298150ea9b0164bbcd4a8eebad875c77ca037abc140687260b08cf6b87d6b8ce0a3c090d690e50491d34a1d802f576a35440605adaee1f16f4512589620999bf2e65fc1194ea28141cfc63e7b9cc4dfc75f8633e3d3cdbc98f0b16f76d212b4658a79d0b70c47985436ced6ebb31192a1770ac4fcab9b64668f37dda91d31ea231fbd5f077
2026-02-02T15:35:30.613926 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(5439a26a) START. Requested: 168. Buffer: 168 bytes.
2026-02-02T15:35:30.613926 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(5439a26a) END (from buffer). Returning 168 bytes: c5b39179e755012bd785c6a4328384933b7e7a4c84248d46ed113010051592e9e5ccb6298150ea9b0164bbcd4a8eebad875c77ca037abc140687260b08cf6b87d6b8ce0a3c090d690e50491d34a1d802f576a35440605adaee1f16f4512589620999bf2e65fc1194ea28141cfc63e7b9cc4dfc75f8633e3d3cdbc98f0b16f76d212b4658a79d0b70c47985436ced6ebb31192a1770ac4fcab9b64668f37dda91d31ea231fbd5f077. Buffer after: 0 bytes: 
2026-02-02T15:35:30.613926 [INFO] [NoiseProtocol] secureInbound: Read msg3: 168 bytes
2026-02-02T15:35:30.623037 [INFO] [NoiseProtocol] secureInbound: Handshake complete. Remote peer: 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:30.623037 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:35:30.624452 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1061869530
2026-02-02T15:35:30.624452 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1063415391
2026-02-02T15:35:30.624452 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:30.624452 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:30.624452 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.624452 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.624452 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [90, 44, 171, 101, 62, 118, 143, 255, 16, 145, 163, 156, 12, 92, 91, 219, 80, 175, 227, 76, 11, 149, 165, 108, 192, 119, 212, 163, 208, 247, 153, 104]
2026-02-02T15:35:30.624452 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:30.625451 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.625451 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:30.625451 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:30.625451 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:30.625451 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:30.625451 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(d7310202) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:30.625451 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(d7310202) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:30.625957 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 0024aa11d44edcdad3d1712434a377bf7f5b5ec641dc8ea2cd0e62fbec1c138e71f5fb53fcbc
2026-02-02T15:35:30.625957 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(d7310202) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.625957 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(d7310202) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: aa11d44edcdad3d1712434a377bf7f5b5ec641dc8ea2cd0e62fbec1c138e71f5fb53fcbc
2026-02-02T15:35:30.626461 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:35:30.626461 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:30.626461 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:35:30.626461 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:35:30.626461 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:35:30.626461 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:35:30.626461 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:35:30.626461 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(8e5672e5) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:35:30.626461 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(8e5672e5) END (from buffer). Returning 36 bytes: aa11d44edcdad3d1712434a377bf7f5b5ec641dc8ea2cd0e62fbec1c138e71f5fb53fcbc. Buffer after: 0 bytes: 
2026-02-02T15:35:30.626973 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [170, 17, 212, 78]
2026-02-02T15:35:30.626973 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:35:30.626973 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: aa11d44edcdad3d1712434a377bf7f5b5ec641dc8ea2cd0e62fbec1c138e71f5fb53fcbc
2026-02-02T15:35:30.626973 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:35:30.626973 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:35:30.626973 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: aa11d44edcdad3d1712434a377bf7f5b5ec641dc
2026-02-02T15:35:30.626973 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 8ea2cd0e62fbec1c138e71f5fb53fcbc
2026-02-02T15:35:30.626973 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [170, 17, 212, 78]
2026-02-02T15:35:30.626973 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [142, 162, 205, 14]
2026-02-02T15:35:30.626973 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [142, 162, 205, 14, 98, 251, 236, 28, 19, 142, 113, 245, 251, 83, 252, 188]
2026-02-02T15:35:30.626973 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:30.626973 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063415391): [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:30.627977 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:35:30.627977 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:30.627977 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:30.627977 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.627977 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:30.628481 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:30.628481 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:30.628481 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:35:30.632444 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:35:30.632444 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:35:30.632444 [FINER] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Writing 38 bytes: 0024445114810f775840e9f605cc1cc4d819952553b1f0ed849a7ee8d7430d753339ac3a98f4
2026-02-02T15:35:30.633449 [FINEST] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Flushed 38 bytes successfully. Data preview (hex): 0024445114810f775840e9f605cc1cc4d8199525...
2026-02-02T15:35:30.633449 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:30.633449 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:30.633449 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:30.633449 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.633449 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.633449 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.633449 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:30.633449 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:30.633449 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:30.633449 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:30.633449 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(2e12470c) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:30.633449 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(2e12470c) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:30.634449 [FINEST] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 0024445114810f775840e9f605cc1cc4d819952553b1f0ed849a7ee8d7430d753339ac3a98f4
2026-02-02T15:35:30.635447 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(46eee04a) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.635447 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(46eee04a) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 445114810f775840e9f605cc1cc4d819952553b1f0ed849a7ee8d7430d753339ac3a98f4
2026-02-02T15:35:30.635447 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:35:30.635447 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:30.635952 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:35:30.635952 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:35:30.635952 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:35:30.635952 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:35:30.635952 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:35:30.635952 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(c8c3d957) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:35:30.635952 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(c8c3d957) END (from buffer). Returning 36 bytes: 445114810f775840e9f605cc1cc4d819952553b1f0ed849a7ee8d7430d753339ac3a98f4. Buffer after: 0 bytes: 
2026-02-02T15:35:30.635952 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [68, 81, 20, 129]
2026-02-02T15:35:30.651950 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:35:30.651950 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 445114810f775840e9f605cc1cc4d819952553b1f0ed849a7ee8d7430d753339ac3a98f4
2026-02-02T15:35:30.651950 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:35:30.651950 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:35:30.651950 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 445114810f775840e9f605cc1cc4d819952553b1
2026-02-02T15:35:30.651950 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: f0ed849a7ee8d7430d753339ac3a98f4
2026-02-02T15:35:30.651950 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [68, 81, 20, 129]
2026-02-02T15:35:30.651950 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [240, 237, 132, 154]
2026-02-02T15:35:30.651950 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [240, 237, 132, 154, 126, 232, 215, 67, 13, 117, 51, 57, 172, 58, 152, 244]
2026-02-02T15:35:30.652952 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:30.652952 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061869530): [90, 44, 171, 101, 62, 118, 143, 255, 16, 145, 163, 156, 12, 92, 91, 219, 80, 175, 227, 76, 11, 149, 165, 108, 192, 119, 212, 163, 208, 247, 153, 104]
2026-02-02T15:35:30.652952 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:35:30.652952 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:30.652952 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:30.652952 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.653950 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:30.653950 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:35:30.653950 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:35:30.653950 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:35:30.653950 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 32 bytes: 001e9ea1fd78812ee5b106515e7fb8fa941e01d310fd190e34358e5adedde9b6
2026-02-02T15:35:30.660948 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e9ea1fd78812ee5b106515e7fb8fa941e01d310fd190e34358e5adedde9b6
2026-02-02T15:35:30.660948 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(2e12470c) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.661952 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(2e12470c) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 9ea1fd78812ee5b106515e7fb8fa941e01d310fd190e34358e5adedde9b6
2026-02-02T15:35:30.661952 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:35:30.661952 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:30.661952 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:35:30.661952 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:35:30.661952 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:35:30.661952 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:35:30.661952 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:35:30.661952 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(5d1410f8) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:35:30.661952 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(5d1410f8) END (from buffer). Returning 30 bytes: 9ea1fd78812ee5b106515e7fb8fa941e01d310fd190e34358e5adedde9b6. Buffer after: 0 bytes: 
2026-02-02T15:35:30.661952 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [158, 161, 253, 120]
2026-02-02T15:35:30.661952 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:35:30.661952 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 9ea1fd78812ee5b106515e7fb8fa941e01d310fd190e34358e5adedde9b6
2026-02-02T15:35:30.661952 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:35:30.661952 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:35:30.662952 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 9ea1fd78812ee5b106515e7fb8fa
2026-02-02T15:35:30.663951 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 941e01d310fd190e34358e5adedde9b6
2026-02-02T15:35:30.663951 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [158, 161, 253, 120]
2026-02-02T15:35:30.663951 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [148, 30, 1, 211]
2026-02-02T15:35:30.663951 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [148, 30, 1, 211, 16, 253, 25, 14, 52, 53, 142, 90, 222, 221, 233, 182]
2026-02-02T15:35:30.663951 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:30.663951 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063415391): [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:30.663951 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:35:30.663951 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:30.663951 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:30.664951 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.664951 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/yamux/1.0.0"
2026-02-02T15:35:30.664951 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/yamux/1.0.0"
2026-02-02T15:35:30.664951 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/yamux/1.0.0". Sending acknowledgment: "/yamux/1.0.0".
2026-02-02T15:35:30.664951 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:30.664951 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:35:30.664951 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:35:30.664951 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:35:30.664951 [FINER] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Writing 32 bytes: 001ed7b17efc11b298590cd168c903f554e0c2ed383d55857c3a3b7abec5382e
2026-02-02T15:35:30.665951 [FINEST] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Flushed 32 bytes successfully. Data preview (hex): 001ed7b17efc11b298590cd168c903f554e0c2ed...
2026-02-02T15:35:30.665951 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/yamux/1.0.0".
2026-02-02T15:35:30.665951 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/yamux/1.0.0" and its handler.
2026-02-02T15:35:30.665951 [FINE] [multistream] [multistreamMuxer - handle] Protocol /yamux/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:30.665951 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /yamux/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:35:30.665951 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:30.666950 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068130666-4586
2026-02-02T15:35:30.666950 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:30.666950 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:35:30.666950 [FINE] [SwarmConn] SwarmConn (0): Context set: c3e388bf-128c-4073-a6ec-5e89202d2bb8
2026-02-02T15:35:30.666950 [FINE] [Swarm] Storing inbound connection for peer=12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr, conn_id=0
2026-02-02T15:35:30.666950 [FINE] [Swarm] Connection stored. Total connections for "12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr": 1
2026-02-02T15:35:30.667951 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr. Conn ID: 0, Direction: Direction.inbound
2026-02-02T15:35:30.667951 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr.
2026-02-02T15:35:30.667951 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr. Conn ID: 0
2026-02-02T15:35:30.667951 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr.
2026-02-02T15:35:30.667951 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr.
2026-02-02T15:35:30.667951 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:30.667951 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Inbound connection from 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr. This peer is the LISTENER - waiting for remote to initiate identify protocol.
2026-02-02T15:35:30.668949 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 32 bytes successfully. Data preview (hex): 001e9ea1fd78812ee5b106515e7fb8fa941e01d3...
2026-02-02T15:35:30.668949 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:30.668949 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.668949 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.668949 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.668949 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:30.668949 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:30.668949 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:30.669950 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:30.669950 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(0e88f2ec) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:30.669950 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(0e88f2ec) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:30.669950 [FINEST] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001ed7b17efc11b298590cd168c903f554e0c2ed383d55857c3a3b7abec5382e
2026-02-02T15:35:30.669950 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(0e88f2ec) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.669950 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(0e88f2ec) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: d7b17efc11b298590cd168c903f554e0c2ed383d55857c3a3b7abec5382e
2026-02-02T15:35:30.670950 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:35:30.670950 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:30.670950 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:35:30.670950 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:35:30.670950 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:35:30.670950 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:35:30.671949 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:35:30.671949 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(a093845d) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:35:30.671949 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(a093845d) END (from buffer). Returning 30 bytes: d7b17efc11b298590cd168c903f554e0c2ed383d55857c3a3b7abec5382e. Buffer after: 0 bytes: 
2026-02-02T15:35:30.671949 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [215, 177, 126, 252]
2026-02-02T15:35:30.671949 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:35:30.671949 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: d7b17efc11b298590cd168c903f554e0c2ed383d55857c3a3b7abec5382e
2026-02-02T15:35:30.671949 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:35:30.671949 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:35:30.671949 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: d7b17efc11b298590cd168c903f5
2026-02-02T15:35:30.671949 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 54e0c2ed383d55857c3a3b7abec5382e
2026-02-02T15:35:30.671949 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [215, 177, 126, 252]
2026-02-02T15:35:30.671949 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [84, 224, 194, 237]
2026-02-02T15:35:30.671949 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [84, 224, 194, 237, 56, 61, 85, 133, 124, 58, 59, 122, 190, 197, 56, 46]
2026-02-02T15:35:30.671949 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:30.672949 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061869530): [90, 44, 171, 101, 62, 118, 143, 255, 16, 145, 163, 156, 12, 92, 91, 219, 80, 175, 227, 76, 11, 149, 165, 108, 192, 119, 212, 163, 208, 247, 153, 104]
2026-02-02T15:35:30.672949 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:35:30.672949 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:30.672949 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:30.672949 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.672949 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.673949 [FINE] [Swarm] Swarm._dialSingleAddr: Successfully dialed and upgraded connection to 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 at /ip4/127.0.0.1/tcp/4602
2026-02-02T15:35:30.673949 [FINE] [HappyEyeballsDialer] Connected via /ip4/127.0.0.1/tcp/4602
2026-02-02T15:35:30.673949 [FINE] [Swarm] Swarm.dialPeer: Successfully connected to 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.673949 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068130673-2653
2026-02-02T15:35:30.673949 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.673949 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:35:30.673949 [FINE] [SwarmConn] SwarmConn (0): Context set: a587f2aa-adc4-4375-95a3-206300cdd924
2026-02-02T15:35:30.674948 [INFO] [Swarm] Swarm.dialPeer: Dial latency for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2: 413ms
2026-02-02T15:35:30.674948 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:30.674948 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.677457 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.678457 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.679457 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:30.680457 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:30.681456 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:30.682455 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:30.682455 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:30.683455 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(d82c7f6a) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:30.683455 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(d82c7f6a) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:30.689453 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:30.691452 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.692453 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.693452 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.693452 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:30.693452 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:30.693452 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:30.693452 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:30.693452 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:30.693452 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(e5e58ad0) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:30.694452 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(e5e58ad0) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:30.695452 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2. Conn ID: 0, Direction: Direction.outbound
2026-02-02T15:35:30.695452 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:30.695452 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2. Conn ID: 0
2026-02-02T15:35:30.696451 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:30.696451 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:30.696451 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Outbound connection to 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2. This peer is the DIALER - initiating identify protocol.
2026-02-02T15:35:30.696451 [FINE] [SwarmConn] SwarmConn.newStream (0): Entered to peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2. Context HashCode: 412486260
2026-02-02T15:35:30.696451 [FINE] [SwarmConn] SwarmConn.newStream (0): Connection is open.
2026-02-02T15:35:30.696451 [FINE] [SwarmConn] SwarmConn.newStream (0): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:35:30.696451 [FINE] [SwarmConn] SwarmConn.newStream (0): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:35:30.696451 [FINE] [YamuxStream] [5][Client] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:30.697451 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.697451 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:30.697451 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:35:30.697451 [FINE] [Swarm] Swarm.dialPeer: Connection established for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2. Conn ID: 0
2026-02-02T15:35:30.697451 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:30.697451 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:30.697451 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 30 bytes: 001c3865459a9f9ba8c9060ec49ea98225bad7deca9ade87e0864a8adf9a
2026-02-02T15:35:30.698451 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 30 bytes successfully. Data preview (hex): 001c3865459a9f9ba8c9060ec49ea98225bad7de...
2026-02-02T15:35:30.699450 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c3865459a9f9ba8c9060ec49ea98225bad7deca9ade87e0864a8adf9a
2026-02-02T15:35:30.699450 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(d82c7f6a) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.699450 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(d82c7f6a) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 3865459a9f9ba8c9060ec49ea98225bad7deca9ade87e0864a8adf9a
2026-02-02T15:35:30.699450 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:30.699450 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:30.699450 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:30.699450 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:30.699450 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:30.699450 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:30.699450 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:30.700450 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(5283d3bf) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:30.700450 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(5283d3bf) END (from buffer). Returning 28 bytes: 3865459a9f9ba8c9060ec49ea98225bad7deca9ade87e0864a8adf9a. Buffer after: 0 bytes: 
2026-02-02T15:35:30.700450 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [56, 101, 69, 154]
2026-02-02T15:35:30.700450 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:30.700450 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 3865459a9f9ba8c9060ec49ea98225bad7deca9ade87e0864a8adf9a
2026-02-02T15:35:30.700450 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:30.700450 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:30.700450 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 3865459a9f9ba8c9060ec49e
2026-02-02T15:35:30.700450 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: a98225bad7deca9ade87e0864a8adf9a
2026-02-02T15:35:30.700450 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [56, 101, 69, 154]
2026-02-02T15:35:30.700450 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [169, 130, 37, 186]
2026-02-02T15:35:30.700450 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [169, 130, 37, 186, 215, 222, 202, 154, 222, 135, 224, 134, 74, 138, 223, 154]
2026-02-02T15:35:30.700450 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:30.701450 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063415391): [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:30.701450 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:35:30.701450 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:30.701450 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:30.701450 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:30.701450 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.701450 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:30.701450 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:35:30.702450 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:30.702450 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:30.702450 [FINER] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Writing 30 bytes: 001cc82900a1d3947fe57045f72e5738b949a89a979ee7f79bff2202c880
2026-02-02T15:35:30.702450 [FINEST] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Flushed 30 bytes successfully. Data preview (hex): 001cc82900a1d3947fe57045f72e5738b949a89a...
2026-02-02T15:35:30.702450 [FINE] [YamuxStream] [4][Server] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:30.703450 [FINER] [YamuxStream] [4][Server] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:35:30.703450 [FINE] [YamuxStream] [4][Server] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:30.703450 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:35:30.703450 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:35:30.703450 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:30.703450 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:30.703450 [FINER] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Writing 30 bytes: 001c9935b3a1c825f7ba862ca00e26e3f5ed93ab36145b70c497d2d0e87b
2026-02-02T15:35:30.703450 [FINEST] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Flushed 30 bytes successfully. Data preview (hex): 001c9935b3a1c825f7ba862ca00e26e3f5ed93ab...
2026-02-02T15:35:30.704450 [FINER] [YamuxStream] [4][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:35:30.704450 [FINE] [Swarm] Accepted inbound stream 1 from 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr on conn 0
2026-02-02T15:35:30.704450 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068130704-9336 for peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:30.724530 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:30.725036 [FINEST] [YamuxStream] [4][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:30.725036 [FINEST] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cc82900a1d3947fe57045f72e5738b949a89a979ee7f79bff2202c880
2026-02-02T15:35:30.725036 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(e5e58ad0) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.725036 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(e5e58ad0) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: c82900a1d3947fe57045f72e5738b949a89a979ee7f79bff2202c880
2026-02-02T15:35:30.725036 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:30.725036 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:30.725036 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:30.725036 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:30.725036 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:30.726680 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:30.726680 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:30.726680 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(bd3c41df) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:30.726680 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(bd3c41df) END (from buffer). Returning 28 bytes: c82900a1d3947fe57045f72e5738b949a89a979ee7f79bff2202c880. Buffer after: 0 bytes: 
2026-02-02T15:35:30.726680 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [200, 41, 0, 161]
2026-02-02T15:35:30.726680 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:30.726680 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: c82900a1d3947fe57045f72e5738b949a89a979ee7f79bff2202c880
2026-02-02T15:35:30.726680 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:30.727701 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:30.727701 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: c82900a1d3947fe57045f72e
2026-02-02T15:35:30.727701 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 5738b949a89a979ee7f79bff2202c880
2026-02-02T15:35:30.727701 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [200, 41, 0, 161]
2026-02-02T15:35:30.727701 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [87, 56, 185, 73]
2026-02-02T15:35:30.727701 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [87, 56, 185, 73, 168, 154, 151, 158, 231, 247, 155, 255, 34, 2, 200, 128]
2026-02-02T15:35:30.727701 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:30.728205 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061869530): [90, 44, 171, 101, 62, 118, 143, 255, 16, 145, 163, 156, 12, 92, 91, 219, 80, 175, 227, 76, 11, 149, 165, 108, 192, 119, 212, 163, 208, 247, 153, 104]
2026-02-02T15:35:30.728205 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:35:30.728205 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:30.728710 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:30.728710 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:30.728710 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.728710 [FINER] [YamuxStream] [5][Client] StreamID=1 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:35:30.728710 [FINER] [YamuxStream] [5][Client] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:35:30.728710 [FINE] [YamuxStream] [5][Client] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:30.729222 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:35:30.729222 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:35:30.729222 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:30.729222 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:30.729222 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 30 bytes: 001cdcc80a9761022fa62ba1d002af6902c6e66bf6a07fe09b5b321a4a59
2026-02-02T15:35:30.729222 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 30 bytes successfully. Data preview (hex): 001cdcc80a9761022fa62ba1d002af6902c6e66b...
2026-02-02T15:35:30.730372 [FINE] [SwarmConn] SwarmConn.newStream (0): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 1
2026-02-02T15:35:30.730372 [FINE] [SwarmConn] SwarmConn.newStream (0): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 1.
2026-02-02T15:35:30.730372 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068130730-9487 for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.730372 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:35:30.730878 [INFO] [ConnectionHealthMetrics] Connection health state changed: ConnectionHealthState.unknown -> ConnectionHealthState.healthy
2026-02-02T15:35:30.730878 [FINE] [identify]  [IDENTIFY-STREAM-CREATE] peer=12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2, stream_id=1, protocol=/ipfs/id/1.0.0, duration=34ms
2026-02-02T15:35:30.730878 [FINE] [YamuxStream] [5][Client] StreamID=1 setDeadline() set to 2026-02-02T15:36:00.730878
2026-02-02T15:35:30.730878 [FINE] [YamuxStream] [5][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:35:30.730878 [INFO] [SwarmConn] SwarmConn (0): Health state changed to ConnectionHealthState.healthy for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.730878 [INFO] [Swarm] Swarm: Connection health changed for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 (0): ConnectionHealthState.healthy -> ConnectionHealthState.healthy
2026-02-02T15:35:30.730878 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:30.730878 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:35:30.731883 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:30.731883 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:30.731883 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 50 bytes: 0030f48861d7260fec13eb498988cc0ad06748d4a4a90e746a17d09b2e4c8c182fc1bcd80bcd38eb74fcc76fc1bae27f230a
2026-02-02T15:35:30.731883 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:30.732896 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.732896 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.732896 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.732896 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:30.732896 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:30.732896 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:30.732896 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:30.732896 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:30.732896 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(c639bd21) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:30.732896 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(c639bd21) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:30.733896 [FINEST] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c9935b3a1c825f7ba862ca00e26e3f5ed93ab36145b70c497d2d0e87b
2026-02-02T15:35:30.733896 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:30.733896 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.733896 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.733896 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.733896 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:30.733896 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:30.733896 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:30.733896 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:30.734896 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:30.734896 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(dd8911a7) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:30.734896 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(dd8911a7) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 9935b3a1c825f7ba862ca00e26e3f5ed93ab36145b70c497d2d0e87b
2026-02-02T15:35:30.734896 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:30.734896 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:30.735402 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:30.735402 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:30.735402 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:30.735402 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:30.735402 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:30.735402 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(7d77a490) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:30.735402 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(7d77a490) END (from buffer). Returning 28 bytes: 9935b3a1c825f7ba862ca00e26e3f5ed93ab36145b70c497d2d0e87b. Buffer after: 0 bytes: 
2026-02-02T15:35:30.735402 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [153, 53, 179, 161]
2026-02-02T15:35:30.735402 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:30.735402 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 9935b3a1c825f7ba862ca00e26e3f5ed93ab36145b70c497d2d0e87b
2026-02-02T15:35:30.736406 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:30.736406 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:30.736406 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 9935b3a1c825f7ba862ca00e
2026-02-02T15:35:30.736406 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 26e3f5ed93ab36145b70c497d2d0e87b
2026-02-02T15:35:30.736406 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [153, 53, 179, 161]
2026-02-02T15:35:30.736406 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [38, 227, 245, 237]
2026-02-02T15:35:30.736406 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [38, 227, 245, 237, 147, 171, 54, 20, 91, 112, 196, 151, 210, 208, 232, 123]
2026-02-02T15:35:30.736912 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:30.736912 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061869530): [90, 44, 171, 101, 62, 118, 143, 255, 16, 145, 163, 156, 12, 92, 91, 219, 80, 175, 227, 76, 11, 149, 165, 108, 192, 119, 212, 163, 208, 247, 153, 104]
2026-02-02T15:35:30.737434 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:35:30.737434 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:30.737434 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:35:30.737434 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:30.737434 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.737434 [FINER] [YamuxStream] [5][Client] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:35:30.737434 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cdcc80a9761022fa62ba1d002af6902c6e66bf6a07fe09b5b321a4a59
2026-02-02T15:35:30.737434 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(c639bd21) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.737434 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(c639bd21) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: dcc80a9761022fa62ba1d002af6902c6e66bf6a07fe09b5b321a4a59
2026-02-02T15:35:30.738472 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:30.738472 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:30.738472 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:30.738472 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:30.738472 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:30.738472 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:30.738472 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:30.738472 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(70a5c5cc) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:30.738472 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(70a5c5cc) END (from buffer). Returning 28 bytes: dcc80a9761022fa62ba1d002af6902c6e66bf6a07fe09b5b321a4a59. Buffer after: 0 bytes: 
2026-02-02T15:35:30.738472 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [220, 200, 10, 151]
2026-02-02T15:35:30.738472 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:30.738472 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: dcc80a9761022fa62ba1d002af6902c6e66bf6a07fe09b5b321a4a59
2026-02-02T15:35:30.738472 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:30.738472 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:30.738472 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: dcc80a9761022fa62ba1d002
2026-02-02T15:35:30.738472 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: af6902c6e66bf6a07fe09b5b321a4a59
2026-02-02T15:35:30.738472 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [220, 200, 10, 151]
2026-02-02T15:35:30.738472 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [175, 105, 2, 198]
2026-02-02T15:35:30.738472 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [175, 105, 2, 198, 230, 107, 246, 160, 127, 224, 155, 91, 50, 26, 74, 89]
2026-02-02T15:35:30.738472 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:30.738472 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063415391): [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:30.739976 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:35:30.739976 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:30.739976 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:35:30.739976 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:30.739976 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.740981 [FINER] [YamuxStream] [4][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:35:30.740981 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 50 bytes successfully. Data preview (hex): 0030f48861d7260fec13eb498988cc0ad06748d4...
2026-02-02T15:35:30.741486 [FINE] [YamuxStream] [5][Client] StreamID=1 Direct write: Successfully wrote all 20 bytes in 10ms
2026-02-02T15:35:30.741486 [FINEST] [YamuxStream] [5][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:30.741486 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:30.741486 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.741486 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.741486 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.741486 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:30.741486 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:30.741486 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:30.741486 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:30.741486 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:30.742490 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(e2f45a17) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:30.742490 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(e2f45a17) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:30.742490 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030f48861d7260fec13eb498988cc0ad06748d4a4a90e746a17d09b2e4c8c182fc1bcd80bcd38eb74fcc76fc1bae27f230a
2026-02-02T15:35:30.742490 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:30.742490 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.742490 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.742490 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.742490 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:30.742490 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:30.742490 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:30.742490 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:30.742490 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:30.742490 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(814df9f1) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:35:30.742490 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(814df9f1) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: f48861d7260fec13eb498988cc0ad06748d4a4a90e746a17d09b2e4c8c182fc1bcd80bcd38eb74fcc76fc1bae27f230a
2026-02-02T15:35:30.743490 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:30.743490 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:30.743490 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:30.743490 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:30.743490 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:30.743490 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:30.743490 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:30.743490 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(46ad6c5b) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:30.743490 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(46ad6c5b) END (from buffer). Returning 48 bytes: f48861d7260fec13eb498988cc0ad06748d4a4a90e746a17d09b2e4c8c182fc1bcd80bcd38eb74fcc76fc1bae27f230a. Buffer after: 0 bytes: 
2026-02-02T15:35:30.743490 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [244, 136, 97, 215]
2026-02-02T15:35:30.743490 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:30.743490 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: f48861d7260fec13eb498988cc0ad06748d4a4a90e746a17d09b2e4c8c182fc1bcd80bcd38eb74fcc76fc1bae27f230a
2026-02-02T15:35:30.743490 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:30.743490 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:30.743490 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: f48861d7260fec13eb498988cc0ad06748d4a4a90e746a17d09b2e4c8c182fc1
2026-02-02T15:35:30.743490 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: bcd80bcd38eb74fcc76fc1bae27f230a
2026-02-02T15:35:30.743490 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [244, 136, 97, 215]
2026-02-02T15:35:30.744489 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [188, 216, 11, 205]
2026-02-02T15:35:30.744489 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [188, 216, 11, 205, 56, 235, 116, 252, 199, 111, 193, 186, 226, 127, 35, 10]
2026-02-02T15:35:30.744489 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:30.744489 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063415391): [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:30.744489 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:35:30.744489 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:30.745227 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:35:30.745227 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:30.745227 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.745227 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:30.745227 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.745227 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.745227 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.745227 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:30.745227 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:30.745227 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:30.745227 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:30.745227 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.745227 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:30.745227 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:30.745227 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:30.745227 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:30.745227 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:30.745227 [FINE] [YamuxStream] [4][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:35:30.746732 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:30.746732 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:35:30.746732 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:30.746732 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:30.746732 [FINER] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Writing 50 bytes: 003012d98d8a46261957713e5f0ea23c988422e93d63958d07fe36f82fd8b662025512e57af9f47d9bb8dfaa54665c70870d
2026-02-02T15:35:30.746732 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:30.746732 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.747736 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.747736 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.747736 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:30.747736 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:30.747736 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:30.747736 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:30.747736 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:30.747736 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(797c6919) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:30.748241 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(797c6919) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:30.748241 [FINEST] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 003012d98d8a46261957713e5f0ea23c988422e93d63958d07fe36f82fd8b662025512e57af9f47d9bb8dfaa54665c70870d
2026-02-02T15:35:30.748241 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(e2f45a17) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.748241 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(e2f45a17) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 12d98d8a46261957713e5f0ea23c988422e93d63958d07fe36f82fd8b662025512e57af9f47d9bb8dfaa54665c70870d
2026-02-02T15:35:30.748241 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:30.748241 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:30.748241 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:30.748241 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:30.748745 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:30.748745 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:30.748745 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:30.748745 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(c8fdb8df) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:30.748745 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(c8fdb8df) END (from buffer). Returning 48 bytes: 12d98d8a46261957713e5f0ea23c988422e93d63958d07fe36f82fd8b662025512e57af9f47d9bb8dfaa54665c70870d. Buffer after: 0 bytes: 
2026-02-02T15:35:30.748745 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [18, 217, 141, 138]
2026-02-02T15:35:30.748745 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:30.748745 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 12d98d8a46261957713e5f0ea23c988422e93d63958d07fe36f82fd8b662025512e57af9f47d9bb8dfaa54665c70870d
2026-02-02T15:35:30.748745 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:30.748745 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:30.748745 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 12d98d8a46261957713e5f0ea23c988422e93d63958d07fe36f82fd8b6620255
2026-02-02T15:35:30.748745 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 12e57af9f47d9bb8dfaa54665c70870d
2026-02-02T15:35:30.748745 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [18, 217, 141, 138]
2026-02-02T15:35:30.748745 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [18, 229, 122, 249]
2026-02-02T15:35:30.748745 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [18, 229, 122, 249, 244, 125, 155, 184, 223, 170, 84, 102, 92, 112, 135, 13]
2026-02-02T15:35:30.749747 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:30.749747 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061869530): [90, 44, 171, 101, 62, 118, 143, 255, 16, 145, 163, 156, 12, 92, 91, 219, 80, 175, 227, 76, 11, 149, 165, 108, 192, 119, 212, 163, 208, 247, 153, 104]
2026-02-02T15:35:30.749747 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:35:30.749747 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:30.749747 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:35:30.749747 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:30.749747 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.749747 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:30.749747 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.749747 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.750747 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.750747 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:30.750747 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:30.750747 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:30.750747 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:30.750747 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.750747 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:30.751253 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:30.751253 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:30.751253 [FINE] [YamuxStream] [5][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:35:30.751253 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:35:30.751756 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:35:30.751756 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:35:30.751756 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:35:30.751756 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 46 bytes: 002cc6247a41d479f43d9372ebbcdfc6e60102fb826511873c43a9e4a49deb8e1aecf09f7e9bae8f7dd6d0ed5236
2026-02-02T15:35:30.751756 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 46 bytes successfully. Data preview (hex): 002cc6247a41d479f43d9372ebbcdfc6e60102fb...
2026-02-02T15:35:30.751756 [FINE] [YamuxStream] [5][Client] StreamID=1 Direct write: Successfully wrote all 16 bytes in 0ms
2026-02-02T15:35:30.751756 [FINEST] [YamuxStream] [5][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:30.752809 [FINEST] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Flushed 50 bytes successfully. Data preview (hex): 003012d98d8a46261957713e5f0ea23c988422e9...
2026-02-02T15:35:30.752809 [FINE] [YamuxStream] [4][Server] StreamID=1 Direct write: Successfully wrote all 20 bytes in 7ms
2026-02-02T15:35:30.752809 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:30.752809 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:30.752809 [FINEST] [YamuxStream] [4][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:30.752809 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:30.752809 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.752809 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.752809 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.752809 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:30.752809 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:30.752809 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:30.752809 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:30.752809 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:30.752809 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(a5d1efbe) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:30.753808 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(a5d1efbe) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:30.753808 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002cc6247a41d479f43d9372ebbcdfc6e60102fb826511873c43a9e4a49deb8e1aecf09f7e9bae8f7dd6d0ed5236
2026-02-02T15:35:30.753808 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(797c6919) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.753808 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(797c6919) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: c6247a41d479f43d9372ebbcdfc6e60102fb826511873c43a9e4a49deb8e1aecf09f7e9bae8f7dd6d0ed5236
2026-02-02T15:35:30.753808 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:35:30.754312 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:30.754312 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:35:30.754312 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:35:30.754312 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:35:30.754312 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:35:30.754312 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:35:30.754312 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(f722d5b9) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:35:30.754312 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(f722d5b9) END (from buffer). Returning 44 bytes: c6247a41d479f43d9372ebbcdfc6e60102fb826511873c43a9e4a49deb8e1aecf09f7e9bae8f7dd6d0ed5236. Buffer after: 0 bytes: 
2026-02-02T15:35:30.754312 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [198, 36, 122, 65]
2026-02-02T15:35:30.754312 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:35:30.754312 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: c6247a41d479f43d9372ebbcdfc6e60102fb826511873c43a9e4a49deb8e1aecf09f7e9bae8f7dd6d0ed5236
2026-02-02T15:35:30.754312 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:35:30.754312 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:35:30.754312 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: c6247a41d479f43d9372ebbcdfc6e60102fb826511873c43a9e4a49d
2026-02-02T15:35:30.754312 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: eb8e1aecf09f7e9bae8f7dd6d0ed5236
2026-02-02T15:35:30.754312 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [198, 36, 122, 65]
2026-02-02T15:35:30.754312 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [235, 142, 26, 236]
2026-02-02T15:35:30.754312 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [235, 142, 26, 236, 240, 159, 126, 155, 174, 143, 125, 214, 208, 237, 82, 54]
2026-02-02T15:35:30.754312 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:30.754312 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063415391): [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:30.755374 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:35:30.755374 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:35:30.755374 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:35:30.755374 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:30.755374 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.755374 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:35:30.755374 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.755374 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.755374 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.755374 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:35:30.755374 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:35:30.755882 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:30.755882 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:35:30.755882 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.755882 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:35:30.755882 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:35:30.755882 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:35:30.755882 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/ipfs/id/1.0.0"
2026-02-02T15:35:30.755882 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/ipfs/id/1.0.0"
2026-02-02T15:35:30.755882 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/ipfs/id/1.0.0". Sending acknowledgment: "/ipfs/id/1.0.0".
2026-02-02T15:35:30.755882 [FINE] [YamuxStream] [4][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:35:30.758897 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:35:30.758897 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:35:30.759897 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:35:30.759897 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:35:30.759897 [FINER] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Writing 46 bytes: 002c939d2475acc3c9a7b1fa5a8b99ab8a5db641f2ee31bcdd4d28795f7b5e5fb84d05fb3d78828016233c912e7c
2026-02-02T15:35:30.761127 [FINEST] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Flushed 46 bytes successfully. Data preview (hex): 002c939d2475acc3c9a7b1fa5a8b99ab8a5db641...
2026-02-02T15:35:30.761127 [FINE] [YamuxStream] [4][Server] StreamID=1 Direct write: Successfully wrote all 16 bytes in 2ms
2026-02-02T15:35:30.761127 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/ipfs/id/1.0.0".
2026-02-02T15:35:30.761127 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/ipfs/id/1.0.0" and its handler.
2026-02-02T15:35:30.761127 [FINE] [multistream] [multistreamMuxer - handle] Protocol /ipfs/id/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:30.761127 [FINE] [StreamScopeImpl] stream-1770068130704-9336: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:30.761127 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
2026-02-02T15:35:30.761127 [FINE] [StreamScopeImpl] stream-1770068130704-9336: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:30.761127 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /ipfs/id/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:35:30.762131 [FINE] [identify] IdentifyService.handleIdentifyRequest: SERVER received identify request from 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr (reported as 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr) on stream 1
2026-02-02T15:35:30.762131 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER ENTRY POINT for peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr. IsPush: false. Stream ID: 1
2026-02-02T15:35:30.762131 [FINE] [identify] IdentifyService.sendIdentifyResp: Preparing to send identify response to 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr. IsPush: false. Stream ID: 1
2026-02-02T15:35:30.762131 [FINER] [identify] IdentifyService.sendIdentifyResp: Setting service scope for stream to 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr.
2026-02-02T15:35:30.762131 [FINE] [StreamScopeImpl] stream-1770068130704-9336: Setting service to libp2p.identify for peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr, protocol /ipfs/id/1.0.0
2026-02-02T15:35:30.762131 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
2026-02-02T15:35:30.762131 [FINE] [StreamScopeImpl] stream-1770068130704-9336: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:35:30.762131 [FINER] [identify] IdentifyService.sendIdentifyResp: Acquiring current snapshot for 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr.
2026-02-02T15:35:30.763635 [FINE] [identify] IdentifyService.sendIdentifyResp: Sending snapshot to 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr: seq=4, protocols=7, addrs=2
2026-02-02T15:35:30.763635 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Creating base response for peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr. Snapshot seq: 4
2026-02-02T15:35:30.763635 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ObservedAddr set to /ip4/127.0.0.1/tcp/58650 for 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:30.764240 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: LocalAddr: /ip4/0.0.0.0/tcp/4602, RemoteAddr: /ip4/127.0.0.1/tcp/58650, ViaLoopback: true for 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:30.764240 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added 2 listen addresses for 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:30.764240 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added public key (36 bytes) for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.764240 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ProtocolVersion: ipfs/0.1.0, AgentVersion: dart-libp2p/0.1.0 for 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:30.764240 [FINER] [identify] IdentifyService._getSignedRecord: Attempting to get signed record. DisableSignedPeerRecord: false, Snapshot record type: Future<Envelope?>
2026-02-02T15:35:30.764745 [FINER] [identify] IdentifyService._getSignedRecord: Marshalled signed record successfully (181 bytes).
2026-02-02T15:35:30.764745 [FINER] [identify] IdentifyService.sendIdentifyResp: Added signed peer record (181 bytes) to response for 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr.
2026-02-02T15:35:30.764745 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER About to write identify message to 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr on stream 1 (remote addr: /ip4/127.0.0.1/tcp/58650)
2026-02-02T15:35:30.764745 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Writing to stream 1 for peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr. Total message size: 435 bytes. SignedPeerRecord present: true
2026-02-02T15:35:30.764745 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Sending as single delimited message (size 435).
2026-02-02T15:35:30.764745 [FINE] [YamuxStream] [4][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 437 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524252
2026-02-02T15:35:30.764745 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 449, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 181, 179, 3, 10, 36, 8, 1, 18, 32])
2026-02-02T15:35:30.764745 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:35:30.765915 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 465 bytes (plaintext was 449)
2026-02-02T15:35:30.765915 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 467
2026-02-02T15:35:30.765915 [FINER] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Writing 467 bytes: 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
2026-02-02T15:35:30.765915 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:30.765915 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.765915 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.765915 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.765915 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:30.766944 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:30.766944 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:30.766944 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:30.766944 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:30.766944 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(d413ad8e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:30.766944 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(d413ad8e) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:30.766944 [FINEST] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002c939d2475acc3c9a7b1fa5a8b99ab8a5db641f2ee31bcdd4d28795f7b5e5fb84d05fb3d78828016233c912e7c
2026-02-02T15:35:30.766944 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(a5d1efbe) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.766944 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(a5d1efbe) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: 939d2475acc3c9a7b1fa5a8b99ab8a5db641f2ee31bcdd4d28795f7b5e5fb84d05fb3d78828016233c912e7c
2026-02-02T15:35:30.766944 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:35:30.766944 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:30.767956 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:35:30.767956 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:35:30.767956 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:35:30.767956 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:35:30.767956 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:35:30.767956 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(2b35aca0) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:35:30.767956 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(2b35aca0) END (from buffer). Returning 44 bytes: 939d2475acc3c9a7b1fa5a8b99ab8a5db641f2ee31bcdd4d28795f7b5e5fb84d05fb3d78828016233c912e7c. Buffer after: 0 bytes: 
2026-02-02T15:35:30.767956 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [147, 157, 36, 117]
2026-02-02T15:35:30.767956 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:35:30.767956 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: 939d2475acc3c9a7b1fa5a8b99ab8a5db641f2ee31bcdd4d28795f7b5e5fb84d05fb3d78828016233c912e7c
2026-02-02T15:35:30.767956 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:35:30.767956 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:35:30.767956 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 939d2475acc3c9a7b1fa5a8b99ab8a5db641f2ee31bcdd4d28795f7b
2026-02-02T15:35:30.767956 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 5e5fb84d05fb3d78828016233c912e7c
2026-02-02T15:35:30.767956 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [147, 157, 36, 117]
2026-02-02T15:35:30.768987 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [94, 95, 184, 77]
2026-02-02T15:35:30.768987 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [94, 95, 184, 77, 5, 251, 61, 120, 130, 128, 22, 35, 60, 145, 46, 124]
2026-02-02T15:35:30.768987 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:30.768987 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061869530): [90, 44, 171, 101, 62, 118, 143, 255, 16, 145, 163, 156, 12, 92, 91, 219, 80, 175, 227, 76, 11, 149, 165, 108, 192, 119, 212, 163, 208, 247, 153, 104]
2026-02-02T15:35:30.768987 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:35:30.768987 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:35:30.768987 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:35:30.768987 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:30.768987 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.768987 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:35:30.768987 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.770017 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.770017 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.770017 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:35:30.770017 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:35:30.770017 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:30.770017 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:35:30.770017 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.770017 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:35:30.770017 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:35:30.770017 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:35:30.770017 [FINE] [YamuxStream] [5][Client] StreamID=1 setDeadline() set to 2026-02-02T15:36:00.770017
2026-02-02T15:35:30.770017 [FINE] [StreamScopeImpl] stream-1770068130730-9487: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.771017 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
2026-02-02T15:35:30.771017 [FINE] [StreamScopeImpl] stream-1770068130730-9487: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:30.771017 [FINE] [identify]  [IDENTIFY-STREAM-READY] peer=12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2, stream_id=1, protocol=/ipfs/id/1.0.0
2026-02-02T15:35:30.771017 [FINE] [StreamScopeImpl] stream-1770068130730-9487: Setting service to libp2p.identify for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2, protocol /ipfs/id/1.0.0
2026-02-02T15:35:30.771525 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
2026-02-02T15:35:30.771525 [FINE] [StreamScopeImpl] stream-1770068130730-9487: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:35:30.771525 [FINEST] [YamuxStream] [5][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:30.780602 [FINEST] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Flushed 467 bytes successfully. Data preview (hex): 01d14a2a91b8522f449e656786c26d2e1d26f5d2...
2026-02-02T15:35:30.780602 [FINE] [YamuxStream] [4][Server] StreamID=1 Direct write: Successfully wrote all 437 bytes in 15ms
2026-02-02T15:35:30.781591 [FINE] [identify] IdentifyService._writeChunkedIdentifyMsg: Single message sent to 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr.
2026-02-02T15:35:30.781591 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Identify message written to 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr.
2026-02-02T15:35:30.781591 [FINER] [identify] IdentifyService.sendIdentifyResp: Updating sequence number for connection to 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr.
2026-02-02T15:35:30.781591 [FINER] [identify] IdentifyService.sendIdentifyResp: Updated sequence for 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr to 4.
2026-02-02T15:35:30.781591 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Signalling end of writes (calling stream.closeWrite()) on stream to 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr.
2026-02-02T15:35:30.781591 [FINER] [YamuxStream] [4][Server] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:35:30.781591 [FINER] [YamuxStream] [4][Server] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:35:30.781591 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:30.781591 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:35:30.781591 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:30.781591 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:30.782591 [FINER] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Writing 30 bytes: 001cacad71a24fa71d7fae89f17671c20f57f25e859349c96c51c9866c1c
2026-02-02T15:35:30.782591 [FINEST] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Flushed 30 bytes successfully. Data preview (hex): 001cacad71a24fa71d7fae89f17671c20f57f25e...
2026-02-02T15:35:30.783591 [FINE] [YamuxStream] [4][Server] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:35:30.783591 [FINE] [YamuxStream] [4][Server] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:35:30.784589 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER stream.closeWrite() completed for 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr. Stream will NOT be fully closed by sendIdentifyResp anymore.
2026-02-02T15:35:30.784589 [FINE] [identify] IdentifyService.sendIdentifyResp: Successfully sent identify response and signalled closeWrite to 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr. IsPush: false.
2026-02-02T15:35:30.784589 [FINEST] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - RAW_SOCKET_DATA_CHUNK_RECV (467 bytes): 01d14a2a91b8522f449e656786c26d2e1d26f5d20d34ba427bdf7521b380dbca79eced2310499558609f4b96564e09573bd72bf2baa7d5c9cd9d563f117aba84bd202b59ee4e528bac92ffea413d83c9f0969c4b18147ffd3555f380a079753cf7a2599fd1651dbcde9699442d19eb8b5594d8f2fd04f21ec5f76992734e76d7595a9f6e0327aabaac8f4ce30abe33fe5f37dd4301e14406bfbb2b067eb2500b01af75d0fc94787a0dfffcd2804310c69d9c0dde5e9486ebdc9332a8efcb087b4b6df4c4fdcb5364645e40e674dda5ba8a5c3e86d4d92b532702d01dc16943ea519580165c3d5df133d005bd45c5be5b8e1344fa16d52520e307902de108973199111e851b68079de34cc5615add58c6ae4f4b57acc7cbe631127adaa6cad3373e2c29e63196dfe407ee9f21d98eaa5355ca0b3170066a0fc37273fa91814501cddd991a7438bb7aca407571934461132ac2b0caebe3b71fead529b8ee129d92e505bb91a8cb7c84f014c2e35b64f681265c1f61b4183634fa5b48f299fc96ab9c99bafaea5b9af7ebf8359b62ecedfee1466726d93d21ca1087d4158c19e405df4c88ff19495402a31d358e186dd46982473e501327d07abdba8695006463c700f1b0883240bdf1be2b0d5da21e139a7037e8
2026-02-02T15:35:30.785590 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:30.785590 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.785590 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.785590 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.785590 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:30.785590 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:30.785590 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:30.785590 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:30.785590 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:30.785590 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(db47b8cf) START. Requested: 2. Buffer: 467 bytes.
2026-02-02T15:35:30.785590 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(db47b8cf) END (from buffer). Returning 2 bytes: 01d1. Buffer after: 465 bytes: 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
2026-02-02T15:35:30.786639 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [1, 209]
2026-02-02T15:35:30.786639 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:30.786639 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [1, 209]
2026-02-02T15:35:30.786639 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 01d1
2026-02-02T15:35:30.786639 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 465
2026-02-02T15:35:30.786639 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 465
2026-02-02T15:35:30.786639 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 465 more bytes (have 0/465)
2026-02-02T15:35:30.787637 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(3843d0da) START. Requested: 465. Buffer: 465 bytes.
2026-02-02T15:35:30.787637 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(3843d0da) END (from buffer). Returning 465 bytes: 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. Buffer after: 0 bytes: 
2026-02-02T15:35:30.787637 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 465 bytes. First 4 bytes: [74, 42, 145, 184]
2026-02-02T15:35:30.787637 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 465, Got: 465
2026-02-02T15:35:30.788637 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 465, Bytes: 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
2026-02-02T15:35:30.788637 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 465
2026-02-02T15:35:30.789637 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(449) and MAC(16)
2026-02-02T15:35:30.790141 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 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
2026-02-02T15:35:30.790141 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 883240bdf1be2b0d5da21e139a7037e8
2026-02-02T15:35:30.791144 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [74, 42, 145, 184]
2026-02-02T15:35:30.791144 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [136, 50, 64, 189]
2026-02-02T15:35:30.791144 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [136, 50, 64, 189, 241, 190, 43, 13, 93, 162, 30, 19, 154, 112, 55, 232]
2026-02-02T15:35:30.791144 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:30.791144 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061869530): [90, 44, 171, 101, 62, 118, 143, 255, 16, 145, 163, 156, 12, 92, 91, 219, 80, 175, 227, 76, 11, 149, 165, 108, 192, 119, 212, 163, 208, 247, 153, 104]
2026-02-02T15:35:30.792145 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 449 bytes
2026-02-02T15:35:30.792145 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 449 bytes to _decryptedBuffer. New _decryptedBuffer.length: 449
2026-02-02T15:35:30.792145 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 437. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 181]
2026-02-02T15:35:30.792145 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:30.792145 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.792145 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=437
2026-02-02T15:35:30.792145 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.792145 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.792145 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.792145 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=437
2026-02-02T15:35:30.792145 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 437, _decryptedBuffer.length: 437
2026-02-02T15:35:30.792145 [FINER] [SecuredConnection] SecuredConnection.read (length=437): Returning 437 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [179, 3, 10, 36, 8, 1, 18, 32, 209, 236, 58, 64, 53, 23, 117, 24, 136, 120, 250, 18]
2026-02-02T15:35:30.792145 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=437
2026-02-02T15:35:30.793145 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.793145 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 437, flags: 0
2026-02-02T15:35:30.793145 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 437 bytes directly to waiting reader
2026-02-02T15:35:30.793145 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 473
2026-02-02T15:35:30.793145 [FINE] [identify]  [READ-ALL-ID-MESSAGES] Parsed identify from peer=12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2, 435 bytes, duration=21ms
2026-02-02T15:35:30.793145 [FINE] [identify] IdentifyService._consumeMessage: Consuming identify message from 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2. IsPush: false.
2026-02-02T15:35:30.793145 [FINER] [identify] IdentifyService._consumeMessage: Current known protocols for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2: 0
2026-02-02T15:35:30.793145 [FINER] [identify] IdentifyService._consumeMessage: Received protocols from 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2: 7
2026-02-02T15:35:30.794145 [FINER] [identify] IdentifyService._diff: Calculating protocol diff. Before: 0, After: 7
2026-02-02T15:35:30.794145 [FINER] [identify] IdentifyService._diff: Added: 7, Removed: 0
2026-02-02T15:35:30.794145 [FINE] [identify] IdentifyService._consumeMessage: For peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 - Added protocols: 7, Removed protocols: 0
2026-02-02T15:35:30.794145 [FINE] [identify] IdentifyService._consumeMessage: Parsed observed address for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2: /ip4/127.0.0.1/tcp/58650
2026-02-02T15:35:30.794145 [FINE] [identify] IdentifyService._consumeMessage: Recording observed address /ip4/127.0.0.1/tcp/58650 for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 via conn 0.
2026-02-02T15:35:30.794145 [FINER] [identify] IdentifyService._consumeMessage: Processing 2 listen addresses from 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:30.795144 [FINE] [identify] IdentifyService._consumeMessage: Parsed 2 listen addresses for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:30.795144 [FINER] [identify] IdentifyService._consumeMessage: Attempting to parse signed peer record for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 (181 bytes).
2026-02-02T15:35:30.796145 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Checking for signed peer record.
2026-02-02T15:35:30.796145 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Attempting to consume envelope from 181 bytes.
2026-02-02T15:35:30.807969 [FINE] [identify] IdentifyService.signedPeerRecordFromMessage: Successfully consumed envelope.
2026-02-02T15:35:30.807969 [FINE] [identify] IdentifyService._consumeMessage: Parsed signed peer record for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2: true
2026-02-02T15:35:30.809174 [FINER] [identify] IdentifyService._consumeMessage: Connectedness for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2: Connectedness.connected. Default TTL: 4:00:00.000000
2026-02-02T15:35:30.809174 [FINER] [identify] IdentifyService._consumeMessage: Peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 is connected/limited, using TTL: 875976:00:00.000000
2026-02-02T15:35:30.809174 [FINER] [identify] IdentifyService._consumeMessage: Updating address book for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2. Current TTLs: RecentlyConnectedAddrTTL=4:00:00.000000, ConnectedAddrTTL=875976:00:00.000000, TempAddrTTL=0:02:00.000000.
2026-02-02T15:35:30.810177 [FINER] [identify] IdentifyService._consumeMessage: Consuming signed peer record for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:30.810177 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Consuming signed record for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:30.810177 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Derived PeerId 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 from record public key for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:30.810177 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Obtained record from envelope for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:30.810177 [FINE] [identify] IdentifyService._consumeSignedPeerRecord: Successfully consumed signed peer record for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2. Found 2 addresses.
2026-02-02T15:35:30.810177 [FINE] [identify] IdentifyService._consumeMessage: Addresses from signed peer record for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2: 2
2026-02-02T15:35:30.810177 [FINER] [identify] IdentifyService._consumeMessage: Filtering addresses for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 based on remote connection address /ip4/127.0.0.1/tcp/4602. Before filter: 2
2026-02-02T15:35:30.810177 [FINER] [identify] IdentifyService._filterAddrs: Filtering 2 addresses based on remote address type: /ip4/127.0.0.1/tcp/4602 (Loopback: true, Private: false, Public: false)
2026-02-02T15:35:30.811259 [FINER] [identify] IdentifyService._filterAddrs: Remote is loopback, returning all addresses.
2026-02-02T15:35:30.811259 [FINER] [identify] IdentifyService._consumeMessage: After filter for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2: 2
2026-02-02T15:35:30.811259 [FINE] [identify] IdentifyService._consumeMessage: Adding 2 addresses for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 to peerstore with TTL 875976:00:00.000000.
2026-02-02T15:35:30.811259 [FINER] [identify] IdentifyService._consumeMessage: Updating TempAddrTTL to zero for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:30.811259 [FINE] [identify] IdentifyService._consumeMessage: Storing metadata for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2: ProtocolVersion=ipfs/0.1.0, AgentVersion=dart-libp2p/0.1.0
2026-02-02T15:35:30.811259 [FINER] [identify] IdentifyService._consumeMessage: Consuming received public key for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:30.811259 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Consuming public key for remote peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 from local peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr.
2026-02-02T15:35:30.811259 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Received 36 bytes for public key of 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:30.812473 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Successfully unmarshalled public key for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:30.812473 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 from received public key for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:30.812473 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 matches expected remote peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:30.812473 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Existing public key found for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2. Comparing with received key.
2026-02-02T15:35:30.812473 [FINE] [identify] IdentifyService._consumeReceivedPubKey: Received public key for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 matches existing key in peerstore.
2026-02-02T15:35:30.813478 [FINE] [identify] IdentifyService._consumeMessage: Finished consuming message from 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:30.813478 [FINER] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Checking push support for 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 in peerstore.
2026-02-02T15:35:30.813478 [FINE] [autonatv2] Peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 identification completed, updating peer map
2026-02-02T15:35:30.813478 [FINE] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 supports push.
2026-02-02T15:35:30.813478 [FINER] [YamuxStream] [5][Client] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:35:30.813478 [FINER] [YamuxStream] [5][Client] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:35:30.813478 [FINE] [autonatv2] Updating peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2: protocols=[/ipfs/id/1.0.0, /ipfs/id/push/1.0.0, /ipfs/ping/1.0.0, /libp2p/autonat/2/dial-back, /libp2p/autonat/2/dial-request, /libp2p/dcutr, /test/request/1.0.0], connectedness=Connectedness.connected
2026-02-02T15:35:30.813478 [FINE] [autonatv2] Adding peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 to AutoNAT v2 peer map (supports /libp2p/autonat/2/dial-request)
2026-02-02T15:35:30.814573 [FINE] [ambient_autonat_v2] Peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 supports AutoNAT v2, scheduling probe
2026-02-02T15:35:30.814573 [FINE] [ambient_autonat_v2] Scheduling probe in 2s (force: true, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:30.814573 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:30.814573 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:35:30.815078 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:30.815078 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:30.815078 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 30 bytes: 001c8c7c122c42636f5f3771ed198c976d8bc03bc0c0cedd51e18162ffd1
2026-02-02T15:35:30.815078 [FINEST] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cacad71a24fa71d7fae89f17671c20f57f25e859349c96c51c9866c1c
2026-02-02T15:35:30.816082 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:30.816082 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.816082 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.816082 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.816082 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:30.816082 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:30.816082 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:30.816082 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:30.816082 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:30.816082 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(0dee933e) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:30.817082 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(0dee933e) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: acad71a24fa71d7fae89f17671c20f57f25e859349c96c51c9866c1c
2026-02-02T15:35:30.817082 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:30.817082 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:30.817082 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:30.817082 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:30.817082 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:30.817082 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:30.817082 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:30.817082 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(4dea94dc) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:30.817082 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(4dea94dc) END (from buffer). Returning 28 bytes: acad71a24fa71d7fae89f17671c20f57f25e859349c96c51c9866c1c. Buffer after: 0 bytes: 
2026-02-02T15:35:30.817082 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [172, 173, 113, 162]
2026-02-02T15:35:30.817082 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:30.818082 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: acad71a24fa71d7fae89f17671c20f57f25e859349c96c51c9866c1c
2026-02-02T15:35:30.818082 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:30.818082 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:30.818082 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: acad71a24fa71d7fae89f176
2026-02-02T15:35:30.818082 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 71c20f57f25e859349c96c51c9866c1c
2026-02-02T15:35:30.818082 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [172, 173, 113, 162]
2026-02-02T15:35:30.818082 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [113, 194, 15, 87]
2026-02-02T15:35:30.818082 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [113, 194, 15, 87, 242, 94, 133, 147, 73, 201, 108, 81, 201, 134, 108, 28]
2026-02-02T15:35:30.819081 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:30.819081 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061869530): [90, 44, 171, 101, 62, 118, 143, 255, 16, 145, 163, 156, 12, 92, 91, 219, 80, 175, 227, 76, 11, 149, 165, 108, 192, 119, 212, 163, 208, 247, 153, 104]
2026-02-02T15:35:30.819081 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:35:30.819081 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:30.819081 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:30.819081 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:30.819081 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.819081 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:30.819081 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:35:30.819081 [FINE] [YamuxStream] [5][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=false, queueSize=0
2026-02-02T15:35:30.820082 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c8c7c122c42636f5f3771ed198c976d8bc03bc0c0cedd51e18162ffd1
2026-02-02T15:35:30.820082 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(d413ad8e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:30.820082 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(d413ad8e) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 8c7c122c42636f5f3771ed198c976d8bc03bc0c0cedd51e18162ffd1
2026-02-02T15:35:30.820082 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:30.820082 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:30.821081 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:30.821081 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:30.821081 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:30.821081 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:30.821081 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:30.821081 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(5d668df2) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:30.821081 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(5d668df2) END (from buffer). Returning 28 bytes: 8c7c122c42636f5f3771ed198c976d8bc03bc0c0cedd51e18162ffd1. Buffer after: 0 bytes: 
2026-02-02T15:35:30.821081 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [140, 124, 18, 44]
2026-02-02T15:35:30.821081 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:30.821081 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 8c7c122c42636f5f3771ed198c976d8bc03bc0c0cedd51e18162ffd1
2026-02-02T15:35:30.821081 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:30.821081 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:30.821081 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 8c7c122c42636f5f3771ed19
2026-02-02T15:35:30.821081 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 8c976d8bc03bc0c0cedd51e18162ffd1
2026-02-02T15:35:30.821081 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [140, 124, 18, 44]
2026-02-02T15:35:30.822080 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [140, 151, 109, 139]
2026-02-02T15:35:30.822080 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [140, 151, 109, 139, 192, 59, 192, 192, 206, 221, 81, 225, 129, 98, 255, 209]
2026-02-02T15:35:30.822080 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:30.822080 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063415391): [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:30.822585 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 12 bytes
2026-02-02T15:35:30.822585 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:30.822585 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:30.822585 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:30.822585 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:30.822585 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:30.822585 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:35:30.822585 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:35:30.822585 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 30 bytes successfully. Data preview (hex): 001c8c7c122c42636f5f3771ed198c976d8bc03b...
2026-02-02T15:35:30.822585 [FINE] [YamuxStream] [5][Client] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.closing.
2026-02-02T15:35:30.823591 [FINE] [YamuxStream] [5][Client] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.closing.
2026-02-02T15:35:30.823591 [FINE] [identify]  [SPAWN-IDENTIFY-SUCCESS] Identify succeeded for peer=12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2, duration=127ms
2026-02-02T15:35:30.823591 [FINE] [Libp2pRouter] [DEBUG] Connected to peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:30.823591 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:30.823591 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.823591 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.823591 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.823591 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:30.823591 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:30.823591 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:30.823591 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:30.823591 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:30.824609 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(b61c47de) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:30.824609 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(b61c47de) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:30.824609 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:30.824609 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:30.824609 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:30.824609 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:30.824609 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:30.824609 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:30.825608 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:30.825608 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:30.825608 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:30.825608 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(485bb9b5) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:30.825608 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(485bb9b5) ASYNC WAIT. Requested: 2. Buffer: 0
01:02 +911 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:31.558358 [INFO] [ambient_autonat_v2] Executing reachability probe
2026-02-02T15:35:31.558994 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:31.558994 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:31.558994 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:31.558994 [WARNING] [ambient_autonat_v2] No addresses to probe
2026-02-02T15:35:31.560007 [FINE] [ambient_autonat_v2] Scheduling probe in 60s (force: false, status: Reachability.unknown, confidence: 0)
01:02 +911 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:31.573556 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
2026-02-02T15:35:31.573556 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4502 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

2026-02-02T15:35:31.573556 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
2026-02-02T15:35:31.575062 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4503 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

2026-02-02T15:35:31.575580 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4502: ServerSocket closed.
2026-02-02T15:35:31.575580 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/4502 connectionStream is done. Removing listener.
2026-02-02T15:35:31.575580 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4502 already closed.
2026-02-02T15:35:31.575580 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4502: ConnectionController closed.
2026-02-02T15:35:31.575580 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWADxJEujRuP4zEw2pnGRe9UxKxfy3nhgtTYvY6yWsJmah
2026-02-02T15:35:31.576585 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4503: ServerSocket closed.
2026-02-02T15:35:31.576585 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/4503 connectionStream is done. Removing listener.
2026-02-02T15:35:31.576585 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4503 already closed.
2026-02-02T15:35:31.576585 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4503: ConnectionController closed.
2026-02-02T15:35:31.577091 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWAFXW43QxkrLiJaCrfu6eMkyecF5uXtioc13KEnCknU2C
2026-02-02T15:35:31.843990 [WARNING] [basichost] 🎯 [newStream] ENTERED for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2, protocols: [/test/request/1.0.0]
2026-02-02T15:35:31.843990 [WARNING] [basichost] 🎯 [newStream Phase 1] Connecting to peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2...
2026-02-02T15:35:31.844995 [WARNING] [basichost] ✅ [newStream Phase 1] Connected to peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:31.844995 [WARNING] [basichost] 🎯 [newStream Phase 2] Creating stream to peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2...
2026-02-02T15:35:31.844995 [WARNING] [Swarm] Swarm.newStream: Entered for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2. Context HashCode: 276887913
2026-02-02T15:35:31.844995 [WARNING] [Swarm] Swarm.newStream: Swarm is open for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2.
2026-02-02T15:35:31.844995 [WARNING] [Swarm] Swarm.newStream: Calling dialPeer(context, 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2).
2026-02-02T15:35:31.844995 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2, existing_conns=1
2026-02-02T15:35:31.844995 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2"
2026-02-02T15:35:31.844995 [FINE] [Swarm] Found 1 existing connections for peer ID string: "12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2"
2026-02-02T15:35:31.844995 [FINE] [Swarm] Swarm.dialPeer: Found 1 existing connection(s) for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2. Validating health...
2026-02-02T15:35:31.845994 [WARNING] [Swarm] Swarm.dialPeer: Found healthy connection for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2. Returning newest connection ID: 0
2026-02-02T15:35:31.845994 [WARNING] [Swarm] Swarm.newStream: Successfully dialed peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2. Conn runtimeType: SwarmConn, Conn ID: 0, Conn local: 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr, Conn remote: 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:31.845994 [WARNING] [Swarm] Swarm.newStream: About to call (conn as SwarmConn).newStream() for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 on SwarmConn 0.
2026-02-02T15:35:31.845994 [FINE] [SwarmConn] SwarmConn.newStream (0): Entered to peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2. Context HashCode: 276887913
2026-02-02T15:35:31.845994 [FINE] [SwarmConn] SwarmConn.newStream (0): Connection is open.
2026-02-02T15:35:31.845994 [FINE] [SwarmConn] SwarmConn.newStream (0): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:35:31.845994 [FINE] [SwarmConn] SwarmConn.newStream (0): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:35:31.845994 [FINE] [YamuxStream] [5][Client] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:31.846993 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:35:31.846993 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:35:31.846993 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:31.846993 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:31.846993 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 30 bytes: 001c275b02c47c56f0a2dbe7e03c093b3971911331b384a6893bd039e5f7
2026-02-02T15:35:31.846993 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 30 bytes successfully. Data preview (hex): 001c275b02c47c56f0a2dbe7e03c093b39719113...
2026-02-02T15:35:31.847994 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c275b02c47c56f0a2dbe7e03c093b3971911331b384a6893bd039e5f7
2026-02-02T15:35:31.847994 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(485bb9b5) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:31.847994 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(485bb9b5) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 275b02c47c56f0a2dbe7e03c093b3971911331b384a6893bd039e5f7
2026-02-02T15:35:31.847994 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:31.847994 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:31.847994 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:31.847994 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:31.847994 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:31.847994 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:31.847994 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:31.847994 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(ece3a8ce) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:31.847994 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(ece3a8ce) END (from buffer). Returning 28 bytes: 275b02c47c56f0a2dbe7e03c093b3971911331b384a6893bd039e5f7. Buffer after: 0 bytes: 
2026-02-02T15:35:31.847994 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [39, 91, 2, 196]
2026-02-02T15:35:31.847994 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:31.848994 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 275b02c47c56f0a2dbe7e03c093b3971911331b384a6893bd039e5f7
2026-02-02T15:35:31.848994 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:31.848994 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:31.848994 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 275b02c47c56f0a2dbe7e03c
2026-02-02T15:35:31.848994 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 093b3971911331b384a6893bd039e5f7
2026-02-02T15:35:31.848994 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [39, 91, 2, 196]
2026-02-02T15:35:31.848994 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [9, 59, 57, 113]
2026-02-02T15:35:31.848994 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [9, 59, 57, 113, 145, 19, 49, 179, 132, 166, 137, 59, 208, 57, 229, 247]
2026-02-02T15:35:31.848994 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:31.848994 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063415391): [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:31.848994 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:35:31.848994 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:31.848994 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:35:31.849993 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:31.849993 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.849993 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:35:31.849993 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:35:31.849993 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:31.849993 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:31.849993 [FINER] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Writing 30 bytes: 001c1d8758d1f2d8660672b8518dacbe317bec7f30b57f043fa7aec88874
2026-02-02T15:35:31.850993 [FINEST] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Flushed 30 bytes successfully. Data preview (hex): 001c1d8758d1f2d8660672b8518dacbe317bec7f...
2026-02-02T15:35:31.850993 [FINE] [YamuxStream] [4][Server] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:31.850993 [FINER] [YamuxStream] [4][Server] StreamID=3 open() called. Current state: YamuxStreamState.init
2026-02-02T15:35:31.850993 [FINE] [YamuxStream] [4][Server] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:31.850993 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
2026-02-02T15:35:31.850993 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
2026-02-02T15:35:31.850993 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:31.850993 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:31.850993 [FINER] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Writing 30 bytes: 001c4b889bdbfc3a7604ee1eeaa91de05ba7978fff540d4cd8385b192920
2026-02-02T15:35:31.851993 [FINEST] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c1d8758d1f2d8660672b8518dacbe317bec7f30b57f043fa7aec88874
2026-02-02T15:35:31.851993 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(b61c47de) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:31.851993 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(b61c47de) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 1d8758d1f2d8660672b8518dacbe317bec7f30b57f043fa7aec88874
2026-02-02T15:35:31.851993 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:31.851993 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:31.851993 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:31.851993 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:31.851993 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:31.851993 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:31.851993 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:31.851993 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(bec87145) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:31.852991 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(bec87145) END (from buffer). Returning 28 bytes: 1d8758d1f2d8660672b8518dacbe317bec7f30b57f043fa7aec88874. Buffer after: 0 bytes: 
2026-02-02T15:35:31.852991 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [29, 135, 88, 209]
2026-02-02T15:35:31.853991 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:31.853991 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 1d8758d1f2d8660672b8518dacbe317bec7f30b57f043fa7aec88874
2026-02-02T15:35:31.853991 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:31.853991 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:31.853991 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 1d8758d1f2d8660672b8518d
2026-02-02T15:35:31.853991 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: acbe317bec7f30b57f043fa7aec88874
2026-02-02T15:35:31.853991 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [29, 135, 88, 209]
2026-02-02T15:35:31.853991 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [172, 190, 49, 123]
2026-02-02T15:35:31.853991 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [172, 190, 49, 123, 236, 127, 48, 181, 127, 4, 63, 167, 174, 200, 136, 116]
2026-02-02T15:35:31.853991 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:31.853991 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061869530): [90, 44, 171, 101, 62, 118, 143, 255, 16, 145, 163, 156, 12, 92, 91, 219, 80, 175, 227, 76, 11, 149, 165, 108, 192, 119, 212, 163, 208, 247, 153, 104]
2026-02-02T15:35:31.853991 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:35:31.853991 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:31.854991 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:35:31.854991 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:31.854991 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.854991 [FINER] [YamuxStream] [5][Client] StreamID=3 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:35:31.854991 [FINER] [YamuxStream] [5][Client] StreamID=3 open() called. Current state: YamuxStreamState.init
2026-02-02T15:35:31.854991 [FINE] [YamuxStream] [5][Client] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:31.854991 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
2026-02-02T15:35:31.854991 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:35:31.854991 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:31.854991 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:31.854991 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 30 bytes: 001c5bd064deaa382b598dd268442817f721d939fefcb114f5a5579f2401
2026-02-02T15:35:31.855991 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 30 bytes successfully. Data preview (hex): 001c5bd064deaa382b598dd268442817f721d939...
2026-02-02T15:35:31.855991 [FINE] [SwarmConn] SwarmConn.newStream (0): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 3
2026-02-02T15:35:31.855991 [FINE] [SwarmConn] SwarmConn.newStream (0): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 3.
2026-02-02T15:35:31.855991 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068131855-9487 for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:31.855991 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:35:31.855991 [WARNING] [Swarm] Swarm.newStream: Successfully called (conn as SwarmConn).newStream() for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2. Returned Stream ID: 3, Stream protocol: Closure: () => String from Function 'protocol':.
2026-02-02T15:35:31.855991 [WARNING] [basichost] ✅ [newStream Phase 2] Stream 3 created to peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:31.855991 [WARNING] [basichost] 🎯 [newStream Phase 3] Waiting for identify on stream 3...
2026-02-02T15:35:31.855991 [FINE] [identify]  [IDENTIFY-WAIT-ALREADY-SUCCEEDED] Peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 already identified on this connection, skipping
2026-02-02T15:35:31.856989 [WARNING] [identify]  [IDENTIFY-WAIT-NO-COMPLETER] No completer to await for peer=12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 (e.g., connection was closed). Identify will not complete.
2026-02-02T15:35:31.856989 [WARNING] [basichost] ✅ [newStream Phase 3] Identify complete for stream 3
2026-02-02T15:35:31.856989 [FINE] [YamuxStream] [5][Client] StreamID=3 setDeadline() set to 2026-02-02T15:35:41.856989
2026-02-02T15:35:31.856989 [WARNING] [basichost] 🎯 [newStream Phase 4] Negotiating protocols [/test/request/1.0.0] on stream 3...
2026-02-02T15:35:31.856989 [FINE] [YamuxStream] [5][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:35:31.856989 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:31.856989 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
2026-02-02T15:35:31.857989 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:31.857989 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:31.857989 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 50 bytes: 0030e18e950c9331dd6fbc2099b53b90f551a500430f6cc2d301e4bca3bee436174d7b25e1b3d3e7a0ab274b8f0bb83f11bf
2026-02-02T15:35:31.857989 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 50 bytes successfully. Data preview (hex): 0030e18e950c9331dd6fbc2099b53b90f551a500...
2026-02-02T15:35:31.858990 [FINE] [YamuxStream] [5][Client] StreamID=3 Direct write: Successfully wrote all 20 bytes in 2ms
2026-02-02T15:35:31.858990 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:31.858990 [FINEST] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Flushed 30 bytes successfully. Data preview (hex): 001c4b889bdbfc3a7604ee1eeaa91de05ba7978f...
2026-02-02T15:35:31.858990 [FINER] [YamuxStream] [4][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:35:31.858990 [FINE] [Swarm] Accepted inbound stream 3 from 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr on conn 0
2026-02-02T15:35:31.858990 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068131858-9336 for peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:31.858990 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:31.858990 [FINEST] [YamuxStream] [4][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:31.859990 [FINEST] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c4b889bdbfc3a7604ee1eeaa91de05ba7978fff540d4cd8385b192920
2026-02-02T15:35:31.859990 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:31.859990 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.859990 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.859990 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.859990 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:31.859990 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:31.859990 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:31.859990 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:31.859990 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:31.859990 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(d8f23350) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:31.859990 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(d8f23350) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 4b889bdbfc3a7604ee1eeaa91de05ba7978fff540d4cd8385b192920
2026-02-02T15:35:31.859990 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:31.860991 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:31.860991 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:31.860991 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:31.860991 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:31.860991 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:31.860991 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:31.860991 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(2bcd02f2) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:31.860991 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(2bcd02f2) END (from buffer). Returning 28 bytes: 4b889bdbfc3a7604ee1eeaa91de05ba7978fff540d4cd8385b192920. Buffer after: 0 bytes: 
2026-02-02T15:35:31.860991 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [75, 136, 155, 219]
2026-02-02T15:35:31.860991 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:31.860991 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 4b889bdbfc3a7604ee1eeaa91de05ba7978fff540d4cd8385b192920
2026-02-02T15:35:31.860991 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:31.860991 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:31.860991 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 4b889bdbfc3a7604ee1eeaa9
2026-02-02T15:35:31.860991 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 1de05ba7978fff540d4cd8385b192920
2026-02-02T15:35:31.860991 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [75, 136, 155, 219]
2026-02-02T15:35:31.860991 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [29, 224, 91, 167]
2026-02-02T15:35:31.860991 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [29, 224, 91, 167, 151, 143, 255, 84, 13, 76, 216, 56, 91, 25, 41, 32]
2026-02-02T15:35:31.861987 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:31.861987 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061869530): [90, 44, 171, 101, 62, 118, 143, 255, 16, 145, 163, 156, 12, 92, 91, 219, 80, 175, 227, 76, 11, 149, 165, 108, 192, 119, 212, 163, 208, 247, 153, 104]
2026-02-02T15:35:31.861987 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 12 bytes
2026-02-02T15:35:31.861987 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:31.861987 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:35:31.861987 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:31.861987 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.861987 [FINER] [YamuxStream] [5][Client] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262124, New: 524268
2026-02-02T15:35:31.862987 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (80 bytes): 001c5bd064deaa382b598dd268442817f721d939fefcb114f5a5579f24010030e18e950c9331dd6fbc2099b53b90f551a500430f6cc2d301e4bca3bee436174d7b25e1b3d3e7a0ab274b8f0bb83f11bf
2026-02-02T15:35:31.862987 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:31.862987 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.862987 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.862987 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.862987 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:31.862987 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:31.862987 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:31.862987 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:31.862987 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:31.862987 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(9eae03c4) START. Requested: 2. Buffer: 80 bytes.
2026-02-02T15:35:31.862987 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(9eae03c4) END (from buffer). Returning 2 bytes: 001c. Buffer after: 78 bytes: 5bd064deaa382b598dd268442817f721d939fefcb114f5a5579f24010030e18e950c9331dd6fbc2099b53b90f551a500430f6cc2d301e4bca3bee436174d7b25e1b3d3e7a0ab274b8f0bb83f11bf
2026-02-02T15:35:31.863992 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:31.863992 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:31.863992 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:31.863992 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:31.863992 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:31.863992 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:31.863992 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:31.863992 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(8534db85) START. Requested: 28. Buffer: 78 bytes.
2026-02-02T15:35:31.863992 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(8534db85) END (from buffer). Returning 28 bytes: 5bd064deaa382b598dd268442817f721d939fefcb114f5a5579f2401. Buffer after: 50 bytes: 0030e18e950c9331dd6fbc2099b53b90f551a500430f6cc2d301e4bca3bee436174d7b25e1b3d3e7a0ab274b8f0bb83f11bf
2026-02-02T15:35:31.863992 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [91, 208, 100, 222]
2026-02-02T15:35:31.863992 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:31.863992 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 5bd064deaa382b598dd268442817f721d939fefcb114f5a5579f2401
2026-02-02T15:35:31.863992 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:31.863992 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:31.863992 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 5bd064deaa382b598dd26844
2026-02-02T15:35:31.863992 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2817f721d939fefcb114f5a5579f2401
2026-02-02T15:35:31.863992 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [91, 208, 100, 222]
2026-02-02T15:35:31.864990 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [40, 23, 247, 33]
2026-02-02T15:35:31.864990 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [40, 23, 247, 33, 217, 57, 254, 252, 177, 20, 245, 165, 87, 159, 36, 1]
2026-02-02T15:35:31.864990 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:31.864990 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063415391): [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:31.864990 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:35:31.864990 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:31.864990 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:35:31.864990 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:31.864990 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.864990 [FINER] [YamuxStream] [4][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:35:31.865992 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:31.865992 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.865992 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.865992 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.865992 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:31.865992 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:31.865992 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:31.865992 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:31.865992 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:31.865992 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(0d22b5a7) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:31.865992 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(0d22b5a7) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:31.865992 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:31.865992 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.865992 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.865992 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.865992 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:31.865992 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:31.865992 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:31.866991 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:31.866991 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:31.866991 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(e9db2afe) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:35:31.866991 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(e9db2afe) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: e18e950c9331dd6fbc2099b53b90f551a500430f6cc2d301e4bca3bee436174d7b25e1b3d3e7a0ab274b8f0bb83f11bf
2026-02-02T15:35:31.866991 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:31.866991 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:31.866991 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:31.866991 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:31.866991 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:31.866991 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:31.866991 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:31.866991 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(36120795) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:31.866991 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(36120795) END (from buffer). Returning 48 bytes: e18e950c9331dd6fbc2099b53b90f551a500430f6cc2d301e4bca3bee436174d7b25e1b3d3e7a0ab274b8f0bb83f11bf. Buffer after: 0 bytes: 
2026-02-02T15:35:31.866991 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [225, 142, 149, 12]
2026-02-02T15:35:31.866991 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:31.866991 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: e18e950c9331dd6fbc2099b53b90f551a500430f6cc2d301e4bca3bee436174d7b25e1b3d3e7a0ab274b8f0bb83f11bf
2026-02-02T15:35:31.867991 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:31.867991 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:31.867991 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: e18e950c9331dd6fbc2099b53b90f551a500430f6cc2d301e4bca3bee436174d
2026-02-02T15:35:31.867991 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 7b25e1b3d3e7a0ab274b8f0bb83f11bf
2026-02-02T15:35:31.867991 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [225, 142, 149, 12]
2026-02-02T15:35:31.867991 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [123, 37, 225, 179]
2026-02-02T15:35:31.867991 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [123, 37, 225, 179, 211, 231, 160, 171, 39, 75, 143, 11, 184, 63, 17, 191]
2026-02-02T15:35:31.867991 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:31.867991 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063415391): [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:31.867991 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 32 bytes
2026-02-02T15:35:31.867991 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:31.867991 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:35:31.868990 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:31.868990 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.868990 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:31.868990 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.868990 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.868990 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.868990 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:31.868990 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:31.868990 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:31.868990 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:31.868990 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.868990 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:31.868990 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:31.868990 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:31.869989 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:31.869989 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:31.869989 [FINE] [YamuxStream] [4][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:35:31.869989 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:31.869989 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:35:31.869989 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:31.869989 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:31.869989 [FINER] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Writing 50 bytes: 0030d5d03e3eeb7dd51d82646cf07915b683fb57fbdf96e23c7fada710b8c0df57aad08c38f2457eb7421d5a64d18cd4cd1b
2026-02-02T15:35:31.870989 [FINEST] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Flushed 50 bytes successfully. Data preview (hex): 0030d5d03e3eeb7dd51d82646cf07915b683fb57...
2026-02-02T15:35:31.870989 [FINE] [YamuxStream] [4][Server] StreamID=3 Direct write: Successfully wrote all 20 bytes in 1ms
2026-02-02T15:35:31.870989 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:31.870989 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:31.870989 [FINEST] [YamuxStream] [4][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:31.870989 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:31.870989 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.870989 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.870989 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.870989 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:31.870989 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:31.870989 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:31.871988 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:31.871988 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:31.871988 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(f5a73818) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:31.871988 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(f5a73818) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:31.871988 [FINEST] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030d5d03e3eeb7dd51d82646cf07915b683fb57fbdf96e23c7fada710b8c0df57aad08c38f2457eb7421d5a64d18cd4cd1b
2026-02-02T15:35:31.871988 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(0d22b5a7) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:31.871988 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(0d22b5a7) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: d5d03e3eeb7dd51d82646cf07915b683fb57fbdf96e23c7fada710b8c0df57aad08c38f2457eb7421d5a64d18cd4cd1b
2026-02-02T15:35:31.871988 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:31.871988 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:31.871988 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:31.871988 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:31.871988 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:31.871988 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:31.871988 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:31.872988 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(45b0a0db) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:31.872988 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(45b0a0db) END (from buffer). Returning 48 bytes: d5d03e3eeb7dd51d82646cf07915b683fb57fbdf96e23c7fada710b8c0df57aad08c38f2457eb7421d5a64d18cd4cd1b. Buffer after: 0 bytes: 
2026-02-02T15:35:31.872988 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [213, 208, 62, 62]
2026-02-02T15:35:31.872988 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:31.872988 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: d5d03e3eeb7dd51d82646cf07915b683fb57fbdf96e23c7fada710b8c0df57aad08c38f2457eb7421d5a64d18cd4cd1b
2026-02-02T15:35:31.872988 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:31.872988 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:31.872988 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: d5d03e3eeb7dd51d82646cf07915b683fb57fbdf96e23c7fada710b8c0df57aa
2026-02-02T15:35:31.872988 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: d08c38f2457eb7421d5a64d18cd4cd1b
2026-02-02T15:35:31.872988 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [213, 208, 62, 62]
2026-02-02T15:35:31.872988 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [208, 140, 56, 242]
2026-02-02T15:35:31.872988 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [208, 140, 56, 242, 69, 126, 183, 66, 29, 90, 100, 209, 140, 212, 205, 27]
2026-02-02T15:35:31.872988 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:31.873988 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061869530): [90, 44, 171, 101, 62, 118, 143, 255, 16, 145, 163, 156, 12, 92, 91, 219, 80, 175, 227, 76, 11, 149, 165, 108, 192, 119, 212, 163, 208, 247, 153, 104]
2026-02-02T15:35:31.873988 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 32 bytes
2026-02-02T15:35:31.873988 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:31.873988 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:35:31.873988 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:31.873988 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.873988 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:31.874987 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.874987 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.874987 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.874987 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:31.874987 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:31.874987 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:31.874987 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:31.874987 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.874987 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:31.874987 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:31.874987 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:31.875987 [FINE] [YamuxStream] [5][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 21 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:35:31.875987 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 33, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 21, 20, 47, 116, 101, 115, 116, 47, 114])
2026-02-02T15:35:31.875987 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:35:31.875987 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 49 bytes (plaintext was 33)
2026-02-02T15:35:31.875987 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 51
2026-02-02T15:35:31.875987 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 51 bytes: 0031ac9749ab95992a627dc86a600e225d8de663491379e2ff1e97287f56788992484fd79e7b2c93303cab9351f3013e8887b6
2026-02-02T15:35:31.879520 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 51 bytes successfully. Data preview (hex): 0031ac9749ab95992a627dc86a600e225d8de663...
2026-02-02T15:35:31.879520 [FINE] [YamuxStream] [5][Client] StreamID=3 Direct write: Successfully wrote all 21 bytes in 3ms
2026-02-02T15:35:31.879520 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:31.880521 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:31.880521 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.880521 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.880521 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.880521 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:31.880521 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:31.880521 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:31.880521 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:31.880521 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:31.880521 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(f2cd3720) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:31.880521 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(f2cd3720) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:31.880521 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (51 bytes): 0031ac9749ab95992a627dc86a600e225d8de663491379e2ff1e97287f56788992484fd79e7b2c93303cab9351f3013e8887b6
2026-02-02T15:35:31.881521 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(f5a73818) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:31.881521 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(f5a73818) END (from buffer). Returning 2 bytes: 0031. Buffer after: 49 bytes: ac9749ab95992a627dc86a600e225d8de663491379e2ff1e97287f56788992484fd79e7b2c93303cab9351f3013e8887b6
2026-02-02T15:35:31.881521 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 49]
2026-02-02T15:35:31.881521 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:31.881521 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 49]
2026-02-02T15:35:31.881521 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0031
2026-02-02T15:35:31.882109 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 49
2026-02-02T15:35:31.882109 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 49
2026-02-02T15:35:31.882109 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 49 more bytes (have 0/49)
2026-02-02T15:35:31.882109 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(e2efde5b) START. Requested: 49. Buffer: 49 bytes.
2026-02-02T15:35:31.882109 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(e2efde5b) END (from buffer). Returning 49 bytes: ac9749ab95992a627dc86a600e225d8de663491379e2ff1e97287f56788992484fd79e7b2c93303cab9351f3013e8887b6. Buffer after: 0 bytes: 
2026-02-02T15:35:31.882109 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 49 bytes. First 4 bytes: [172, 151, 73, 171]
2026-02-02T15:35:31.882109 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 49, Got: 49
2026-02-02T15:35:31.882109 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 49, Bytes: ac9749ab95992a627dc86a600e225d8de663491379e2ff1e97287f56788992484fd79e7b2c93303cab9351f3013e8887b6
2026-02-02T15:35:31.882109 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 49
2026-02-02T15:35:31.882109 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(33) and MAC(16)
2026-02-02T15:35:31.882620 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: ac9749ab95992a627dc86a600e225d8de663491379e2ff1e97287f56788992484f
2026-02-02T15:35:31.882620 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: d79e7b2c93303cab9351f3013e8887b6
2026-02-02T15:35:31.882620 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [172, 151, 73, 171]
2026-02-02T15:35:31.882620 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [215, 158, 123, 44]
2026-02-02T15:35:31.882620 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [215, 158, 123, 44, 147, 48, 60, 171, 147, 81, 243, 1, 62, 136, 135, 182]
2026-02-02T15:35:31.882620 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:31.882620 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063415391): [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:31.882620 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 33 bytes
2026-02-02T15:35:31.882620 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 33 bytes to _decryptedBuffer. New _decryptedBuffer.length: 33
2026-02-02T15:35:31.882620 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 21. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 21]
2026-02-02T15:35:31.882620 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:31.882620 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.882620 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=21
2026-02-02T15:35:31.882620 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.882620 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.882620 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.882620 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=21
2026-02-02T15:35:31.882620 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 21, _decryptedBuffer.length: 21
2026-02-02T15:35:31.882620 [FINER] [SecuredConnection] SecuredConnection.read (length=21): Returning 21 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [20, 47, 116, 101, 115, 116, 47, 114, 101, 113, 117, 101, 115, 116, 47, 49, 46, 48, 46, 48]
2026-02-02T15:35:31.882620 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=21
2026-02-02T15:35:31.882620 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.882620 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 21, flags: 0
2026-02-02T15:35:31.883655 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 21 bytes directly to waiting reader
2026-02-02T15:35:31.883655 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 41
2026-02-02T15:35:31.883655 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/test/request/1.0.0"
2026-02-02T15:35:31.883655 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/test/request/1.0.0"
2026-02-02T15:35:31.883655 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/test/request/1.0.0". Sending acknowledgment: "/test/request/1.0.0".
2026-02-02T15:35:31.883655 [FINE] [YamuxStream] [4][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 21 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:35:31.883655 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 33, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 21, 20, 47, 116, 101, 115, 116, 47, 114])
2026-02-02T15:35:31.883655 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
2026-02-02T15:35:31.883655 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 49 bytes (plaintext was 33)
2026-02-02T15:35:31.883655 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 51
2026-02-02T15:35:31.883655 [FINER] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Writing 51 bytes: 00317b93cfc90c3c0b8875617c72945be5812a08d5f6d089666e725a7d90616bbf434f277a0e1612f7a4a31dcc7162c2797ef5
2026-02-02T15:35:31.883655 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:31.884651 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.884651 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.884651 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.884651 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:31.884651 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:31.884651 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:31.884651 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:31.884651 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:31.884651 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(115acb95) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:31.885155 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(115acb95) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:31.885155 [FINEST] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - RAW_SOCKET_DATA_CHUNK_RECV (51 bytes): 00317b93cfc90c3c0b8875617c72945be5812a08d5f6d089666e725a7d90616bbf434f277a0e1612f7a4a31dcc7162c2797ef5
2026-02-02T15:35:31.885155 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(f2cd3720) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:31.885155 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(f2cd3720) END (from buffer). Returning 2 bytes: 0031. Buffer after: 49 bytes: 7b93cfc90c3c0b8875617c72945be5812a08d5f6d089666e725a7d90616bbf434f277a0e1612f7a4a31dcc7162c2797ef5
2026-02-02T15:35:31.885155 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 49]
2026-02-02T15:35:31.885155 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:31.885155 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 49]
2026-02-02T15:35:31.885155 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0031
2026-02-02T15:35:31.885155 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 49
2026-02-02T15:35:31.885155 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 49
2026-02-02T15:35:31.885155 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 49 more bytes (have 0/49)
2026-02-02T15:35:31.885155 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(ee2270f4) START. Requested: 49. Buffer: 49 bytes.
2026-02-02T15:35:31.886170 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(ee2270f4) END (from buffer). Returning 49 bytes: 7b93cfc90c3c0b8875617c72945be5812a08d5f6d089666e725a7d90616bbf434f277a0e1612f7a4a31dcc7162c2797ef5. Buffer after: 0 bytes: 
2026-02-02T15:35:31.886170 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 49 bytes. First 4 bytes: [123, 147, 207, 201]
2026-02-02T15:35:31.886170 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 49, Got: 49
2026-02-02T15:35:31.886170 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 49, Bytes: 7b93cfc90c3c0b8875617c72945be5812a08d5f6d089666e725a7d90616bbf434f277a0e1612f7a4a31dcc7162c2797ef5
2026-02-02T15:35:31.886170 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 49
2026-02-02T15:35:31.886170 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(33) and MAC(16)
2026-02-02T15:35:31.886170 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 7b93cfc90c3c0b8875617c72945be5812a08d5f6d089666e725a7d90616bbf434f
2026-02-02T15:35:31.886170 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 277a0e1612f7a4a31dcc7162c2797ef5
2026-02-02T15:35:31.886170 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [123, 147, 207, 201]
2026-02-02T15:35:31.886170 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [39, 122, 14, 22]
2026-02-02T15:35:31.886170 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [39, 122, 14, 22, 18, 247, 164, 163, 29, 204, 113, 98, 194, 121, 126, 245]
2026-02-02T15:35:31.886170 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=11 ([0, 0, 0, 0, 11, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:31.886170 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061869530): [90, 44, 171, 101, 62, 118, 143, 255, 16, 145, 163, 156, 12, 92, 91, 219, 80, 175, 227, 76, 11, 149, 165, 108, 192, 119, 212, 163, 208, 247, 153, 104]
2026-02-02T15:35:31.887170 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=11, got 33 bytes
2026-02-02T15:35:31.887170 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 33 bytes to _decryptedBuffer. New _decryptedBuffer.length: 33
2026-02-02T15:35:31.887170 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 21. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 21]
2026-02-02T15:35:31.887170 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:31.887170 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.887170 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=21
2026-02-02T15:35:31.887170 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.887170 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.887170 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.887170 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=21
2026-02-02T15:35:31.887170 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 21, _decryptedBuffer.length: 21
2026-02-02T15:35:31.887170 [FINER] [SecuredConnection] SecuredConnection.read (length=21): Returning 21 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [20, 47, 116, 101, 115, 116, 47, 114, 101, 113, 117, 101, 115, 116, 47, 49, 46, 48, 46, 48]
2026-02-02T15:35:31.887170 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=21
2026-02-02T15:35:31.888169 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.888169 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 21, flags: 0
2026-02-02T15:35:31.888169 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 21 bytes directly to waiting reader
2026-02-02T15:35:31.888169 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 41
2026-02-02T15:35:31.888169 [WARNING] [basichost] ✅ [newStream Phase 4] Protocol negotiated: /test/request/1.0.0 on stream 3
2026-02-02T15:35:31.888673 [FINE] [YamuxStream] [5][Client] StreamID=3 setDeadline() cleared (set to null)
2026-02-02T15:35:31.888673 [WARNING] [basichost] 🎯 [newStream Phase 5] Setting up protocol /test/request/1.0.0 on stream 3...
2026-02-02T15:35:31.888673 [FINE] [StreamScopeImpl] stream-1770068131855-9487: Setting protocol to /test/request/1.0.0 for peer 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:31.888673 [FINE] [ResourceManagerImpl] Creating new protocol scope: /test/request/1.0.0
2026-02-02T15:35:31.889023 [FINE] [StreamScopeImpl] stream-1770068131855-9487: Successfully set protocol to /test/request/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:31.889023 [WARNING] [basichost] ✅ [newStream Phase 5] Protocol setup complete for stream 3
2026-02-02T15:35:31.889023 [WARNING] [basichost] ✅ [newStream] COMPLETE - Returning stream 3 with protocol /test/request/1.0.0
2026-02-02T15:35:31.889023 [FINE] [YamuxStream] [5][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 6 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524247
2026-02-02T15:35:31.889565 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 18, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 6, 5, 72, 101, 108, 108, 111])
2026-02-02T15:35:31.889565 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
2026-02-02T15:35:31.889565 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 34 bytes (plaintext was 18)
2026-02-02T15:35:31.889565 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 36
2026-02-02T15:35:31.889565 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 36 bytes: 0022b3e0d881f36f9af3e0cdc0d94d98fec9831b22752b11bc86f2a76b92b9fda85b5dff
2026-02-02T15:35:31.890096 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 36 bytes successfully. Data preview (hex): 0022b3e0d881f36f9af3e0cdc0d94d98fec9831b...
2026-02-02T15:35:31.890096 [FINE] [YamuxStream] [5][Client] StreamID=3 Direct write: Successfully wrote all 6 bytes in 1ms
2026-02-02T15:35:31.890664 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:31.890664 [FINEST] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Flushed 51 bytes successfully. Data preview (hex): 00317b93cfc90c3c0b8875617c72945be5812a08...
2026-02-02T15:35:31.890664 [FINE] [YamuxStream] [4][Server] StreamID=3 Direct write: Successfully wrote all 21 bytes in 7ms
2026-02-02T15:35:31.890664 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/test/request/1.0.0".
2026-02-02T15:35:31.890664 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/test/request/1.0.0" and its handler.
2026-02-02T15:35:31.890664 [FINE] [multistream] [multistreamMuxer - handle] Protocol /test/request/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:31.891668 [FINE] [StreamScopeImpl] stream-1770068131858-9336: Setting protocol to /test/request/1.0.0 for peer 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:31.891668 [FINE] [ResourceManagerImpl] Creating new protocol scope: /test/request/1.0.0
2026-02-02T15:35:31.891668 [FINE] [StreamScopeImpl] stream-1770068131858-9336: Successfully set protocol to /test/request/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:31.891668 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /test/request/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:35:31.891668 [FINEST] [YamuxStream] [4][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:31.891668 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:31.891668 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.892171 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.892171 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.892171 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:31.892171 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:31.892171 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:31.892171 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:31.892171 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:31.892171 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(afac7dfe) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:31.892171 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(afac7dfe) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:31.892171 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (36 bytes): 0022b3e0d881f36f9af3e0cdc0d94d98fec9831b22752b11bc86f2a76b92b9fda85b5dff
2026-02-02T15:35:31.892171 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(115acb95) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:31.892171 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(115acb95) END (from buffer). Returning 2 bytes: 0022. Buffer after: 34 bytes: b3e0d881f36f9af3e0cdc0d94d98fec9831b22752b11bc86f2a76b92b9fda85b5dff
2026-02-02T15:35:31.892171 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 34]
2026-02-02T15:35:31.892171 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:31.892171 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 34]
2026-02-02T15:35:31.892171 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0022
2026-02-02T15:35:31.892171 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 34
2026-02-02T15:35:31.893173 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 34
2026-02-02T15:35:31.893173 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 34 more bytes (have 0/34)
2026-02-02T15:35:31.893173 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(d798fdea) START. Requested: 34. Buffer: 34 bytes.
2026-02-02T15:35:31.893173 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(d798fdea) END (from buffer). Returning 34 bytes: b3e0d881f36f9af3e0cdc0d94d98fec9831b22752b11bc86f2a76b92b9fda85b5dff. Buffer after: 0 bytes: 
2026-02-02T15:35:31.893173 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 34 bytes. First 4 bytes: [179, 224, 216, 129]
2026-02-02T15:35:31.893173 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 34, Got: 34
2026-02-02T15:35:31.893173 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 34, Bytes: b3e0d881f36f9af3e0cdc0d94d98fec9831b22752b11bc86f2a76b92b9fda85b5dff
2026-02-02T15:35:31.893173 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 34
2026-02-02T15:35:31.893173 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(18) and MAC(16)
2026-02-02T15:35:31.893173 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: b3e0d881f36f9af3e0cdc0d94d98fec9831b
2026-02-02T15:35:31.893173 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 22752b11bc86f2a76b92b9fda85b5dff
2026-02-02T15:35:31.893173 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [179, 224, 216, 129]
2026-02-02T15:35:31.893173 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [34, 117, 43, 17]
2026-02-02T15:35:31.893173 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [34, 117, 43, 17, 188, 134, 242, 167, 107, 146, 185, 253, 168, 91, 93, 255]
2026-02-02T15:35:31.893173 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=11 ([0, 0, 0, 0, 11, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:31.894174 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063415391): [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:31.894174 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=11, got 18 bytes
2026-02-02T15:35:31.894174 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 18 bytes to _decryptedBuffer. New _decryptedBuffer.length: 18
2026-02-02T15:35:31.894677 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 6. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 6]
2026-02-02T15:35:31.894677 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:31.894677 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.894677 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=6
2026-02-02T15:35:31.894677 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.894677 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.894677 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.894677 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=6
2026-02-02T15:35:31.894677 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 6, _decryptedBuffer.length: 6
2026-02-02T15:35:31.894677 [FINER] [SecuredConnection] SecuredConnection.read (length=6): Returning 6 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [5, 72, 101, 108, 108, 111]
2026-02-02T15:35:31.894677 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=6
2026-02-02T15:35:31.894677 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.894677 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 6, flags: 0
2026-02-02T15:35:31.894677 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 6 bytes directly to waiting reader
2026-02-02T15:35:31.895681 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 47
2026-02-02T15:35:31.895681 [FINEST] [YamuxStream] [4][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:31.895681 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() returning 5 bytes from queue.
2026-02-02T15:35:31.895681 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() requested maxLength 1, data is 5. Returning partial and re-queuing 4 bytes.
2026-02-02T15:35:31.895681 [FINEST] [YamuxStream] [4][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:31.895681 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() returning 4 bytes from queue.
2026-02-02T15:35:31.895681 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() requested maxLength 1, data is 4. Returning partial and re-queuing 3 bytes.
2026-02-02T15:35:31.895681 [FINEST] [YamuxStream] [4][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:31.895681 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() returning 3 bytes from queue.
2026-02-02T15:35:31.895681 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() requested maxLength 1, data is 3. Returning partial and re-queuing 2 bytes.
2026-02-02T15:35:31.895681 [FINEST] [YamuxStream] [4][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:31.896681 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() returning 2 bytes from queue.
2026-02-02T15:35:31.896681 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() requested maxLength 1, data is 2. Returning partial and re-queuing 1 bytes.
2026-02-02T15:35:31.896681 [FINEST] [YamuxStream] [4][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:31.896681 [FINEST] [YamuxStream] [4][Server] StreamID=3 read() returning 1 bytes from queue.
2026-02-02T15:35:31.896681 [FINE] [YamuxStream] [4][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 12 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524247
2026-02-02T15:35:31.897680 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 24, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 12, 11, 69, 99, 104, 111, 58, 32, 72])
2026-02-02T15:35:31.897680 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=12
2026-02-02T15:35:31.897680 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 40 bytes (plaintext was 24)
2026-02-02T15:35:31.897680 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 42
2026-02-02T15:35:31.897680 [FINER] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Writing 42 bytes: 002817060b3de9f7ed303010c9dd3e3a1a486ebda50311948ae3fdee8b069b3545adb64f1b6e0a879f40
2026-02-02T15:35:31.898680 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:31.898680 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.898680 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.898680 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.898680 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:31.898680 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:31.899185 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:31.899185 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:31.899185 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:31.899185 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(fd33df75) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:31.899185 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(fd33df75) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:31.899185 [FINEST] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - RAW_SOCKET_DATA_CHUNK_RECV (42 bytes): 002817060b3de9f7ed303010c9dd3e3a1a486ebda50311948ae3fdee8b069b3545adb64f1b6e0a879f40
2026-02-02T15:35:31.899185 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(afac7dfe) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:31.899185 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(afac7dfe) END (from buffer). Returning 2 bytes: 0028. Buffer after: 40 bytes: 17060b3de9f7ed303010c9dd3e3a1a486ebda50311948ae3fdee8b069b3545adb64f1b6e0a879f40
2026-02-02T15:35:31.899185 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 40]
2026-02-02T15:35:31.899185 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:31.899185 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 40]
2026-02-02T15:35:31.899185 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0028
2026-02-02T15:35:31.899185 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 40
2026-02-02T15:35:31.899185 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 40
2026-02-02T15:35:31.899185 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 40 more bytes (have 0/40)
2026-02-02T15:35:31.899185 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(bec00773) START. Requested: 40. Buffer: 40 bytes.
2026-02-02T15:35:31.899185 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(bec00773) END (from buffer). Returning 40 bytes: 17060b3de9f7ed303010c9dd3e3a1a486ebda50311948ae3fdee8b069b3545adb64f1b6e0a879f40. Buffer after: 0 bytes: 
2026-02-02T15:35:31.899185 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 40 bytes. First 4 bytes: [23, 6, 11, 61]
2026-02-02T15:35:31.899185 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 40, Got: 40
2026-02-02T15:35:31.899185 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 40, Bytes: 17060b3de9f7ed303010c9dd3e3a1a486ebda50311948ae3fdee8b069b3545adb64f1b6e0a879f40
2026-02-02T15:35:31.899185 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 40
2026-02-02T15:35:31.899185 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(24) and MAC(16)
2026-02-02T15:35:31.900696 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 17060b3de9f7ed303010c9dd3e3a1a486ebda50311948ae3
2026-02-02T15:35:31.900696 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: fdee8b069b3545adb64f1b6e0a879f40
2026-02-02T15:35:31.900696 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [23, 6, 11, 61]
2026-02-02T15:35:31.900696 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [253, 238, 139, 6]
2026-02-02T15:35:31.900696 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [253, 238, 139, 6, 155, 53, 69, 173, 182, 79, 27, 110, 10, 135, 159, 64]
2026-02-02T15:35:31.900696 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=12 ([0, 0, 0, 0, 12, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:31.900696 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1061869530): [90, 44, 171, 101, 62, 118, 143, 255, 16, 145, 163, 156, 12, 92, 91, 219, 80, 175, 227, 76, 11, 149, 165, 108, 192, 119, 212, 163, 208, 247, 153, 104]
2026-02-02T15:35:31.900696 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=12, got 24 bytes
2026-02-02T15:35:31.900696 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 24 bytes to _decryptedBuffer. New _decryptedBuffer.length: 24
2026-02-02T15:35:31.901699 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 12. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 12]
2026-02-02T15:35:31.901699 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:31.901699 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.901699 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:31.901699 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.901699 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.901699 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.902204 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:31.902204 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 12
2026-02-02T15:35:31.902204 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [11, 69, 99, 104, 111, 58, 32, 72, 101, 108, 108, 111]
2026-02-02T15:35:31.902204 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:31.902204 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.902204 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 12, flags: 0
2026-02-02T15:35:31.902204 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 12 bytes directly to waiting reader
2026-02-02T15:35:31.902204 [FINE] [YamuxStream] [5][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 53
2026-02-02T15:35:31.902204 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:31.902204 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 11 bytes from queue.
2026-02-02T15:35:31.902204 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 11. Returning partial and re-queuing 10 bytes.
2026-02-02T15:35:31.902204 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:31.902204 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 10 bytes from queue.
2026-02-02T15:35:31.902204 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 10. Returning partial and re-queuing 9 bytes.
2026-02-02T15:35:31.902204 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:31.902204 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 9 bytes from queue.
2026-02-02T15:35:31.902204 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 9. Returning partial and re-queuing 8 bytes.
2026-02-02T15:35:31.902204 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:31.902204 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 8 bytes from queue.
2026-02-02T15:35:31.902204 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 8. Returning partial and re-queuing 7 bytes.
2026-02-02T15:35:31.902204 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:31.902204 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 7 bytes from queue.
2026-02-02T15:35:31.903341 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 7. Returning partial and re-queuing 6 bytes.
2026-02-02T15:35:31.903341 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:31.903341 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 6 bytes from queue.
2026-02-02T15:35:31.903341 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 6. Returning partial and re-queuing 5 bytes.
2026-02-02T15:35:31.903341 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:31.903341 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 5 bytes from queue.
2026-02-02T15:35:31.903341 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 5. Returning partial and re-queuing 4 bytes.
2026-02-02T15:35:31.903844 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:31.903844 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 4 bytes from queue.
2026-02-02T15:35:31.903844 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 4. Returning partial and re-queuing 3 bytes.
2026-02-02T15:35:31.903844 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:31.903844 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 3 bytes from queue.
2026-02-02T15:35:31.903844 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 3. Returning partial and re-queuing 2 bytes.
2026-02-02T15:35:31.903844 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:31.903844 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 2 bytes from queue.
2026-02-02T15:35:31.903844 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() requested maxLength 1, data is 2. Returning partial and re-queuing 1 bytes.
2026-02-02T15:35:31.903844 [FINEST] [YamuxStream] [5][Client] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:31.904551 [FINEST] [YamuxStream] [5][Client] StreamID=3 read() returning 1 bytes from queue.
2026-02-02T15:35:31.904551 [FINE] [SwarmStream] Closing stream 3
2026-02-02T15:35:31.904551 [FINE] [YamuxStream] [5][Client] StreamID=3 close() called. Current state: YamuxStreamState.open
2026-02-02T15:35:31.904551 [FINER] [YamuxStream] [5][Client] StreamID=3 Sending pending WINDOW_UPDATE for 53 consumed bytes before local FIN.
2026-02-02T15:35:31.904551 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 0, 0, 53])
2026-02-02T15:35:31.904551 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=12
2026-02-02T15:35:31.905106 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:31.905106 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:31.905106 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 30 bytes: 001c9cea75ca7903730d891a76a070a270c220d59ece0eb87db896a31fbe
2026-02-02T15:35:31.905616 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 30 bytes successfully. Data preview (hex): 001c9cea75ca7903730d891a76a070a270c220d5...
2026-02-02T15:35:31.905616 [FINER] [YamuxStream] [5][Client] StreamID=3 Sending FIN frame (DATA frame with FIN flag) for local close().
2026-02-02T15:35:31.905616 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:35:31.905616 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=13
2026-02-02T15:35:31.905616 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:31.905616 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:31.905616 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 30 bytes: 001c7d344de4a04e3b159a98b8d799cbbcfa51caed537071106be48c0913
2026-02-02T15:35:31.905616 [FINEST] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Flushed 42 bytes successfully. Data preview (hex): 002817060b3de9f7ed303010c9dd3e3a1a486ebd...
2026-02-02T15:35:31.905616 [FINE] [YamuxStream] [4][Server] StreamID=3 Direct write: Successfully wrote all 12 bytes in 7ms
2026-02-02T15:35:31.905616 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:31.905616 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.905616 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.905616 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.905616 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:31.907131 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:31.907131 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:31.907131 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:31.907131 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:31.907131 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(cd47a95e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:31.907131 [FINER] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Read(cd47a95e) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:31.907652 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (60 bytes): 001c9cea75ca7903730d891a76a070a270c220d59ece0eb87db896a31fbe001c7d344de4a04e3b159a98b8d799cbbcfa51caed537071106be48c0913
2026-02-02T15:35:31.907652 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(fd33df75) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:31.907652 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(fd33df75) END (from buffer). Returning 2 bytes: 001c. Buffer after: 58 bytes: 9cea75ca7903730d891a76a070a270c220d59ece0eb87db896a31fbe001c7d344de4a04e3b159a98b8d799cbbcfa51caed537071106be48c0913
2026-02-02T15:35:31.908663 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:31.908663 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:31.908663 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:31.908663 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:31.908663 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:31.908663 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:31.908663 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:31.908663 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(02443afb) START. Requested: 28. Buffer: 58 bytes.
2026-02-02T15:35:31.908663 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(02443afb) END (from buffer). Returning 28 bytes: 9cea75ca7903730d891a76a070a270c220d59ece0eb87db896a31fbe. Buffer after: 30 bytes: 001c7d344de4a04e3b159a98b8d799cbbcfa51caed537071106be48c0913
2026-02-02T15:35:31.908663 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [156, 234, 117, 202]
2026-02-02T15:35:31.908663 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:31.908663 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 9cea75ca7903730d891a76a070a270c220d59ece0eb87db896a31fbe
2026-02-02T15:35:31.908663 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:31.908663 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:31.909713 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 9cea75ca7903730d891a76a0
2026-02-02T15:35:31.909713 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 70a270c220d59ece0eb87db896a31fbe
2026-02-02T15:35:31.909713 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [156, 234, 117, 202]
2026-02-02T15:35:31.909713 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [112, 162, 112, 194]
2026-02-02T15:35:31.909713 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [112, 162, 112, 194, 32, 213, 158, 206, 14, 184, 125, 184, 150, 163, 31, 190]
2026-02-02T15:35:31.909713 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=12 ([0, 0, 0, 0, 12, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:31.909713 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063415391): [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:31.909713 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=12, got 12 bytes
2026-02-02T15:35:31.909713 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:31.909713 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 0, 0, 53]
2026-02-02T15:35:31.909713 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:31.909713 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.910739 [FINER] [YamuxStream] [4][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 53. Current our send window: 524235, New: 524288
2026-02-02T15:35:31.910739 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 30 bytes successfully. Data preview (hex): 001c7d344de4a04e3b159a98b8d799cbbcfa51ca...
2026-02-02T15:35:31.910739 [FINER] [YamuxStream] [5][Client] StreamID=3 close() ensuring cleanup. State before final cleanup: YamuxStreamState.closed (was YamuxStreamState.open).
2026-02-02T15:35:31.910739 [FINER] [YamuxStream] [5][Client] StreamID=3 _cleanup() called. State before cleanup: YamuxStreamState.closed
2026-02-02T15:35:31.910739 [FINER] [YamuxStream] [5][Client] StreamID=3 _cleanup() - state set to: YamuxStreamState.closed (was YamuxStreamState.closed)
2026-02-02T15:35:31.910739 [FINER] [YamuxStream] [5][Client] StreamID=3 _cleanup() closing incomingController.
2026-02-02T15:35:31.910739 [FINE] [YamuxStream] [5][Client] StreamID=3 _cleanup() finished. Final state: YamuxStreamState.closed
2026-02-02T15:35:31.910739 [FINE] [YamuxStream] [5][Client] StreamID=3 close() completed. Final state: YamuxStreamState.closed
2026-02-02T15:35:31.910739 [FINE] [SwarmStream] Stream 3: Cleaning up management scope
2026-02-02T15:35:31.910739 [FINE] [SwarmStream] Stream 3 closed
2026-02-02T15:35:31.910739 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:31.910739 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:31.910739 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:31.910739 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:31.910739 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:31.910739 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:35:31.911738 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:31.911738 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:31.911738 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:31.911738 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:31.911738 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:31.911738 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
01:02 +912 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should send and receive messages
01:02 +912 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:31.911738 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:31.912738 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:31.912738 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:31.912738 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:31.912738 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:31.912738 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:31.912738 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:31.912738 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:35:31.912738 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:31.912738 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:35:31.912738 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:31.912738 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.912738 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.913759 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.913759 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:31.913759 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:31.913759 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:31.913759 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:31.913759 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:31.913759 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(305fae14) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:31.914261 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(305fae14) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 7d344de4a04e3b159a98b8d799cbbcfa51caed537071106be48c0913
2026-02-02T15:35:31.914261 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:31.914261 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:31.914261 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:31.914261 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:31.914261 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:31.914261 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:31.914261 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:31.914261 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(1379ffcf) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:31.914261 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(1379ffcf) END (from buffer). Returning 28 bytes: 7d344de4a04e3b159a98b8d799cbbcfa51caed537071106be48c0913. Buffer after: 0 bytes: 
2026-02-02T15:35:31.914261 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [125, 52, 77, 228]
2026-02-02T15:35:31.914261 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:31.914261 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 7d344de4a04e3b159a98b8d799cbbcfa51caed537071106be48c0913
2026-02-02T15:35:31.914261 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:31.914261 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:31.914261 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 7d344de4a04e3b159a98b8d7
2026-02-02T15:35:31.914261 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 99cbbcfa51caed537071106be48c0913
2026-02-02T15:35:31.914261 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [125, 52, 77, 228]
2026-02-02T15:35:31.914261 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [153, 203, 188, 250]
2026-02-02T15:35:31.914261 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [153, 203, 188, 250, 81, 202, 237, 83, 112, 113, 16, 107, 228, 140, 9, 19]
2026-02-02T15:35:31.914261 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=13 ([0, 0, 0, 0, 13, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:31.914261 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063415391): [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:31.915352 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=13, got 12 bytes
2026-02-02T15:35:31.915352 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:31.915352 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:35:31.915352 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:31.915352 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:31.915352 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:31.915352 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:35:31.915352 [FINE] [YamuxStream] [4][Server] StreamID=3 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=false, queueSize=0
2026-02-02T15:35:31.915352 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:31.915352 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:31.915352 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:31.915352 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:31.915352 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:31.915352 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:31.915352 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:31.915352 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:31.915352 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:31.915352 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(3be4651c) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:31.915352 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(3be4651c) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:31.929679 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:31.929679 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:31.931925 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
01:02 +913 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should send and receive messages
01:02 +913 -3: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:31.933099 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:31.933099 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:31.936212 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:31.936212 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:31.936212 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:31.936212 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:31.937715 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:31.937715 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby - Initial _network.listenAddresses: []
2026-02-02T15:35:31.937715 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby, Host hashCode: 572017393
2026-02-02T15:35:31.937715 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:31.937715 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:31.937715 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:31.938802 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby
2026-02-02T15:35:31.938802 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:31.938802 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
01:03 +913 -3: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:32.249381 [SEVERE] [Swarm] Swarm.dialPeer: All parallel dial attempts failed for 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN: Exception: All dial attempts failed: /ip4/127.0.0.1/tcp/4102: Exception: Failed to connect: SocketException: The remote computer refused the network connection (OS Error: The remote computer refused the network connection, errno = 1225), address = 127.0.0.1, port = 58649
2026-02-02T15:35:32.249381 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN after 2184ms: Exception: All dial attempts failed: Exception: All dial attempts failed: /ip4/127.0.0.1/tcp/4102: Exception: Failed to connect: SocketException: The remote computer refused the network connection (OS Error: The remote computer refused the network connection, errno = 1225), address = 127.0.0.1, port = 58649
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:963:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      BasicHost.newStream (package:dart_libp2p/p2p/host/basic/basic_host.dart:1216:7)
<asynchronous suspension>
#4      Libp2pRouter.sendMessage (package:dart_ipfs/src/transport/libp2p_router.dart:291:22)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:87:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:32.250890 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2184ms (dial: 2184ms): Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /ip4/127.0.0.1/tcp/4102: Exception: Failed to connect: SocketException: The remote computer refused the network connection (OS Error: The remote computer refused the network connection, errno = 1225), address = 127.0.0.1, port = 58649
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      BasicHost.newStream (package:dart_libp2p/p2p/host/basic/basic_host.dart:1216:7)
<asynchronous suspension>
#3      Libp2pRouter.sendMessage (package:dart_ipfs/src/transport/libp2p_router.dart:291:22)
<asynchronous suspension>
#4      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_test.dart:87:7)
<asynchronous suspension>
#5      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#7      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:32.250890 [SEVERE] [Libp2pRouter] [ERROR] Failed to send message to 12D3KooWSGSrDMLb2hNNQgKYgVanLBXprEoWqjtMoSvXhiejKKwN
Error: Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /ip4/127.0.0.1/tcp/4102: Exception: Failed to connect: SocketException: The remote computer refused the network connection (OS Error: The remote computer refused the network connection, errno = 1225), address = 127.0.0.1, port = 58649
Stack trace: null
01:03 +913 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage broadcastMessage should handle failure for some peers
01:03 +913 -4: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should send and receive messages [E]
  Exception: Failed to dial: Exception: All dial attempts failed: Exception: All dial attempts failed: /ip4/127.0.0.1/tcp/4102: Exception: Failed to connect: SocketException: The remote computer refused the network connection (OS Error: The remote computer refused the network connection, errno = 1225), address = 127.0.0.1, port = 58649
  package:dart_libp2p/p2p/host/basic/basic_host.dart 1146:7  BasicHost._dialPeer
  ===== asynchronous gap ===========================
  package:dart_libp2p/p2p/host/basic/basic_host.dart 1074:7  BasicHost.connect
  ===== asynchronous gap ===========================
  package:dart_libp2p/p2p/host/basic/basic_host.dart 1216:7  BasicHost.newStream
  ===== asynchronous gap ===========================
  package:dart_ipfs/src/transport/libp2p_router.dart 291:22  Libp2pRouter.sendMessage
  ===== asynchronous gap ===========================
  test\transport\libp2p_router_test.dart 87:7                main.<fn>.<fn>
  
01:03 +913 -4: test\transport\libp2p_router_test.dart: Libp2pRouter Integration should start and stop successfully
2026-02-02T15:35:32.273497 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:32.273497 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:32.273497 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:32.275003 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:32.275003 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:32.275003 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:35:32.275524 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:32.275524 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:32.275524 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:32.275524 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:32.275524 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:32.275524 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:35:32.276539 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:32.276539 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:32.276539 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:32.276539 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:32.276539 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:32.276539 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:32.276539 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:32.277540 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:35:32.277540 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:32.277540 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
01:03 +913 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:32.842597 [FINE] [ambient_autonat_v2] Probe generation 2 cancelled (current: 3)
2026-02-02T15:35:32.856444 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4601 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

2026-02-02T15:35:32.862948 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:35:32.862948 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:32.862948 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:32.862948 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:32.862948 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:32.862948 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:32.862948 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:32.862948 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:32.863952 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:32.863952 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:32.863952 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:35:32.863952 [INFO] [Config] [Config.newNode] for peer 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby: Host created. Listening will be handled by host.start().
2026-02-02T15:35:32.863952 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:32.863952 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby, network.hashCode: 425934210, initial network.listenAddresses: []
2026-02-02T15:35:32.863952 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:35:32.864956 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/0]. Attempting to listen via _network.listen().
2026-02-02T15:35:32.864956 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:35:32.865955 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/0] for peer 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby
2026-02-02T15:35:32.865955 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:35:32.865955 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/0 for peer 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby
2026-02-02T15:35:32.865955 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/0 with transport TCPTransport for peer 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby
2026-02-02T15:35:32.865955 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/0 with transport TCPTransport
2026-02-02T15:35:32.886746 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4601: ServerSocket closed.
2026-02-02T15:35:32.887745 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/4601 connectionStream is done. Removing listener.
2026-02-02T15:35:32.887745 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4601 already closed.
2026-02-02T15:35:32.887745 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4601: ConnectionController closed.
2026-02-02T15:35:32.887745 [FINE] [SwarmStream] Closing stream 1
2026-02-02T15:35:32.887745 [FINE] [YamuxStream] [5][Client] StreamID=1 close() called. Current state: YamuxStreamState.closing
2026-02-02T15:35:32.887745 [FINER] [YamuxStream] [5][Client] StreamID=1 Sending FIN frame (DATA frame with FIN flag) for local close().
2026-02-02T15:35:32.888319 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr
2026-02-02T15:35:32.888319 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:32.888319 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=14
2026-02-02T15:35:32.888319 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:32.888319 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:32.888319 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 30 bytes: 001c5d757194de45377780dc87bd12e0202005b87de5b166fcbeda9440f2
2026-02-02T15:35:32.888319 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 30 bytes successfully. Data preview (hex): 001c5d757194de45377780dc87bd12e0202005b8...
2026-02-02T15:35:32.888319 [FINER] [YamuxStream] [5][Client] StreamID=1 close() ensuring cleanup. State before final cleanup: YamuxStreamState.closed (was YamuxStreamState.closing).
2026-02-02T15:35:32.889325 [FINER] [YamuxStream] [5][Client] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.closed
2026-02-02T15:35:32.889325 [FINER] [YamuxStream] [5][Client] StreamID=1 _cleanup() - state set to: YamuxStreamState.closed (was YamuxStreamState.closed)
2026-02-02T15:35:32.889325 [FINER] [YamuxStream] [5][Client] StreamID=1 _cleanup() closing incomingController.
2026-02-02T15:35:32.889325 [FINE] [YamuxStream] [5][Client] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.closed
2026-02-02T15:35:32.889325 [FINE] [YamuxStream] [5][Client] StreamID=1 close() completed. Final state: YamuxStreamState.closed
2026-02-02T15:35:32.889325 [FINE] [SwarmStream] Stream 1: Cleaning up management scope
2026-02-02T15:35:32.889325 [FINE] [SwarmStream] Stream 1 closed
2026-02-02T15:35:32.889325 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:32.889325 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=15
2026-02-02T15:35:32.889325 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:32.889325 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:32.889325 [FINER] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Writing 30 bytes: 001c64e560b4f312c0138b29e987e314e829add90a810b451031c1d5ad79
2026-02-02T15:35:32.890325 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c5d757194de45377780dc87bd12e0202005b87de5b166fcbeda9440f2
2026-02-02T15:35:32.890325 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(3be4651c) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:32.890325 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(3be4651c) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 5d757194de45377780dc87bd12e0202005b87de5b166fcbeda9440f2
2026-02-02T15:35:32.890325 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:32.890325 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:32.890325 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:32.891006 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:32.891006 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:32.891006 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:32.891006 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:32.891006 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(5220ba3f) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:32.891006 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(5220ba3f) END (from buffer). Returning 28 bytes: 5d757194de45377780dc87bd12e0202005b87de5b166fcbeda9440f2. Buffer after: 0 bytes: 
2026-02-02T15:35:32.891006 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [93, 117, 113, 148]
2026-02-02T15:35:32.891006 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:32.891006 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 5d757194de45377780dc87bd12e0202005b87de5b166fcbeda9440f2
2026-02-02T15:35:32.891006 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:32.891006 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:32.891006 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 5d757194de45377780dc87bd
2026-02-02T15:35:32.891006 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 12e0202005b87de5b166fcbeda9440f2
2026-02-02T15:35:32.892026 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [93, 117, 113, 148]
2026-02-02T15:35:32.892026 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [18, 224, 32, 32]
2026-02-02T15:35:32.892026 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [18, 224, 32, 32, 5, 184, 125, 229, 177, 102, 252, 190, 218, 148, 64, 242]
2026-02-02T15:35:32.892026 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=14 ([0, 0, 0, 0, 14, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:32.892026 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063415391): [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:32.892026 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=14, got 12 bytes
2026-02-02T15:35:32.893022 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:32.893022 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:32.893022 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:32.893022 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:32.893022 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:32.893022 [FINE] [YamuxStream] [4][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:35:32.893022 [FINEST] [TCPConnection] TCPConnection.write (id: 099cf64b-0365-4b64-badd-fda1276d90c9): Flushed 30 bytes successfully. Data preview (hex): 001c64e560b4f312c0138b29e987e314e829add9...
2026-02-02T15:35:32.893022 [FINE] [YamuxStream] [5][Client] StreamID=1 forceReset() called. Current state: YamuxStreamState.closed
2026-02-02T15:35:32.893022 [FINER] [YamuxStream] [5][Client] StreamID=1 forceReset() called but stream already closed/reset. State: YamuxStreamState.closed. Doing nothing.
2026-02-02T15:35:32.893022 [FINE] [YamuxStream] [5][Client] StreamID=3 forceReset() called. Current state: YamuxStreamState.closed
2026-02-02T15:35:32.893022 [FINER] [YamuxStream] [5][Client] StreamID=3 forceReset() called but stream already closed/reset. State: YamuxStreamState.closed. Doing nothing.
2026-02-02T15:35:32.894022 [FINE] [Swarm] AcceptStream loop for conn 0 to 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2 terminated due to connection closure.
2026-02-02T15:35:32.894022 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Error in _readAndDecryptMessage: Bad state: Connection closed while a read was pending. Current _decryptedBuffer.length: 0
2026-02-02T15:35:32.894022 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:32.895021 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:32.895021 [FINE] [TCPConnection] TCPConnection(099cf64b-0365-4b64-badd-fda1276d90c9) - Connection closed.
2026-02-02T15:35:32.895021 [FINEST] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c64e560b4f312c0138b29e987e314e829add90a810b451031c1d5ad79
2026-02-02T15:35:32.896021 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:32.896021 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:32.896021 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:32.896021 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:32.896021 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:32.896021 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:32.896021 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:32.896021 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:32.896021 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:32.896021 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(c48ba89f) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:32.896021 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(c48ba89f) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 64e560b4f312c0138b29e987e314e829add90a810b451031c1d5ad79
2026-02-02T15:35:32.896021 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:32.896021 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:32.896021 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:32.896021 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:32.897019 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:32.897019 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:32.897019 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:32.897019 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(85dfd530) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:32.897019 [FINER] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Read(85dfd530) END (from buffer). Returning 28 bytes: 64e560b4f312c0138b29e987e314e829add90a810b451031c1d5ad79. Buffer after: 0 bytes: 
2026-02-02T15:35:32.897019 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [100, 229, 96, 180]
2026-02-02T15:35:32.897019 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:32.897019 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 64e560b4f312c0138b29e987e314e829add90a810b451031c1d5ad79
2026-02-02T15:35:32.897019 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:32.897019 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:32.897019 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 64e560b4f312c0138b29e987
2026-02-02T15:35:32.898524 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: e314e829add90a810b451031c1d5ad79
2026-02-02T15:35:32.899528 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [100, 229, 96, 180]
2026-02-02T15:35:32.899528 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [227, 20, 232, 41]
2026-02-02T15:35:32.899528 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [227, 20, 232, 41, 173, 217, 10, 129, 11, 69, 16, 49, 193, 213, 173, 121]
2026-02-02T15:35:32.900527 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=15 ([0, 0, 0, 0, 15, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:32.900527 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1063415391): [103, 35, 188, 112, 153, 172, 112, 31, 216, 207, 189, 244, 102, 106, 126, 101, 22, 23, 56, 60, 216, 38, 237, 34, 20, 49, 143, 103, 159, 77, 185, 170]
2026-02-02T15:35:32.902527 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=15, got 12 bytes
2026-02-02T15:35:32.903526 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:32.903526 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]
2026-02-02T15:35:32.904526 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:32.904526 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:32.904526 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:32.904526 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=13
2026-02-02T15:35:32.905526 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:32.905526 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:32.905526 [FINER] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Writing 30 bytes: 001c4c4164afc628fc46695db6a81b166fdebb0a5de10c83bda40f80793b
2026-02-02T15:35:32.905526 [FINEST] [TCPConnection] TCPConnection.write (id: efdaf6f4-cbb8-4480-abec-4107cf386a48): Flushed 30 bytes successfully. Data preview (hex): 001c4c4164afc628fc46695db6a81b166fdebb0a...
2026-02-02T15:35:32.905526 [FINE] [YamuxStream] [4][Server] StreamID=1 forceReset() called. Current state: YamuxStreamState.closing
2026-02-02T15:35:32.905526 [FINER] [YamuxStream] [4][Server] StreamID=1 _cleanup() called. State before cleanup: YamuxStreamState.reset
2026-02-02T15:35:32.905526 [FINER] [YamuxStream] [4][Server] StreamID=1 _cleanup() - state set to: YamuxStreamState.reset (was YamuxStreamState.reset)
2026-02-02T15:35:32.906528 [FINER] [YamuxStream] [4][Server] StreamID=1 _cleanup() closing incomingController.
2026-02-02T15:35:32.906528 [FINE] [YamuxStream] [4][Server] StreamID=1 _cleanup() finished. Final state: YamuxStreamState.reset
2026-02-02T15:35:32.906528 [FINE] [YamuxStream] [4][Server] StreamID=1 forceReset() completed. Final state: YamuxStreamState.reset
2026-02-02T15:35:32.906528 [FINE] [YamuxStream] [4][Server] StreamID=3 forceReset() called. Current state: YamuxStreamState.closing
2026-02-02T15:35:32.906528 [FINER] [YamuxStream] [4][Server] StreamID=3 _cleanup() called. State before cleanup: YamuxStreamState.reset
2026-02-02T15:35:32.906528 [FINER] [YamuxStream] [4][Server] StreamID=3 _cleanup() - state set to: YamuxStreamState.reset (was YamuxStreamState.reset)
2026-02-02T15:35:32.906528 [FINER] [YamuxStream] [4][Server] StreamID=3 _cleanup() closing incomingController.
2026-02-02T15:35:32.906528 [FINE] [YamuxStream] [4][Server] StreamID=3 _cleanup() finished. Final state: YamuxStreamState.reset
2026-02-02T15:35:32.906528 [FINE] [YamuxStream] [4][Server] StreamID=3 forceReset() completed. Final state: YamuxStreamState.reset
2026-02-02T15:35:32.906528 [WARNING] [Swarm] Error in acceptStream loop for conn 0 to 12D3KooWPS3DDQesumyFaL5vh3bCcs2XemCEPsd8htz3KzdfM2sr: Bad state: Session closed while waiting for stream. Loop terminating.
2026-02-02T15:35:32.908527 [FINE] [TCPConnection] TCPConnection(efdaf6f4-cbb8-4480-abec-4107cf386a48) - Connection closed.
2026-02-02T15:35:33.307394 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/0. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/58652 for peer 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby
2026-02-02T15:35:33.307394 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/0 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/58652
2026-02-02T15:35:33.307394 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/58652. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58652] for peer 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby
2026-02-02T15:35:33.307394 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.308393 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/58652 for peer 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby. This should be resolved to concrete addresses by the host.
2026-02-02T15:35:33.308393 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby
2026-02-02T15:35:33.308393 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/58652
2026-02-02T15:35:33.308393 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby.
2026-02-02T15:35:33.308393 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.308393 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.308393 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.308393 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.309396 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.309396 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.309396 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:33.309396 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.309396 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.309396 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58652 (first component not IP)
2026-02-02T15:35:33.309396 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:33.309396 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58652 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58652
2026-02-02T15:35:33.309396 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58652 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58652
2026-02-02T15:35:33.310392 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.310392 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58652 (first component not IP)
2026-02-02T15:35:33.310392 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:33.310392 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby - resolvedAddrs: {/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652}
2026-02-02T15:35:33.310392 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652}
2026-02-02T15:35:33.310392 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652}
2026-02-02T15:35:33.310392 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby - Returning: [/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652]
2026-02-02T15:35:33.319348 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:33.319348 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.320348 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 425934210, network.listenAddresses: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.321347 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:33.321347 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby, Host hashCode: 572017393
2026-02-02T15:35:33.321347 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.321347 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.321347 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58652 (first component not IP)
2026-02-02T15:35:33.321347 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:33.322347 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58652 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58652
2026-02-02T15:35:33.322347 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58652 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58652
2026-02-02T15:35:33.322347 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.322347 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58652 (first component not IP)
2026-02-02T15:35:33.322347 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:33.322347 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby - resolvedAddrs: {/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652}
2026-02-02T15:35:33.322347 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652}
2026-02-02T15:35:33.322347 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652}
2026-02-02T15:35:33.322347 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby - Returning: [/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652]
2026-02-02T15:35:33.322347 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby
2026-02-02T15:35:33.323347 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:33.323347 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:33.323347 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby, Host hashCode: 572017393
2026-02-02T15:35:33.323347 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.323347 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.323347 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58652 (first component not IP)
2026-02-02T15:35:33.323347 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:33.323347 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58652 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58652
2026-02-02T15:35:33.324346 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58652 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58652
2026-02-02T15:35:33.324346 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.325346 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58652 (first component not IP)
2026-02-02T15:35:33.325346 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:33.325346 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby - resolvedAddrs: {/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652}
2026-02-02T15:35:33.325346 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652}
2026-02-02T15:35:33.325346 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652}
2026-02-02T15:35:33.325346 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby - Returning: [/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652]
2026-02-02T15:35:33.325346 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby
2026-02-02T15:35:33.327346 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:33.327346 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:33.327346 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:33.327346 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.327346 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 425934210, network.listenAddresses: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.327346 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.327346 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 425934210, network.listenAddresses: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.328346 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby
2026-02-02T15:35:33.328346 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:33.328346 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby, Host hashCode: 572017393
2026-02-02T15:35:33.328346 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.328346 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.328346 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58652 (first component not IP)
2026-02-02T15:35:33.328346 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:33.329346 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58652 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58652
2026-02-02T15:35:33.329346 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58652 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58652
2026-02-02T15:35:33.330344 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.330344 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58652 (first component not IP)
2026-02-02T15:35:33.330344 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:33.331344 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby - resolvedAddrs: {/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652}
2026-02-02T15:35:33.331344 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652}
2026-02-02T15:35:33.331344 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652}
2026-02-02T15:35:33.331344 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby - Returning: [/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652]
2026-02-02T15:35:33.331344 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58652, /ip4/172.29.112.1/tcp/58652] for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby
2026-02-02T15:35:33.331344 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby
2026-02-02T15:35:33.332344 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.332344 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 425934210, network.listenAddresses: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.332344 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:33.332344 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.332344 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 425934210, network.listenAddresses: [/ip4/0.0.0.0/tcp/58652]
2026-02-02T15:35:33.332344 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:35:33.332344 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:33.332344 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/0 with ID: 12D3KooWR2YsRmWBRgs6f2LKC5K2gk3auqpjMc4Dq1XyaGCeUqby
2026-02-02T15:35:33.333344 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:33.333344 [FINE] [Libp2pRouter] [VERBOSE] Sending message to 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2 via protocol /test
2026-02-02T15:35:33.333344 [WARNING] [basichost] 🎯 [newStream] ENTERED for peer 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2, protocols: [/test]
2026-02-02T15:35:33.333344 [WARNING] [basichost] 🎯 [newStream Phase 1] Connecting to peer 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2...
2026-02-02T15:35:33.334345 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:33.334345 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:33.334345 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2, existing_conns=0
2026-02-02T15:35:33.334345 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2"
2026-02-02T15:35:33.334345 [FINE] [Swarm] Found 0 existing connections for peer ID string: "12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2"
2026-02-02T15:35:33.334345 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2. Dialing.
2026-02-02T15:35:33.334345 [WARNING] [Swarm] Swarm.dialPeer: No addresses found in peerstore for peer: 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2
2026-02-02T15:35:33.335345 [SEVERE] [basichost] ❌ [DIAL-PEER-ERROR] Failed to dial 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2 after 1ms: Exception: No addresses found for peer: 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2
#0      Swarm.dialPeer (package:dart_libp2p/p2p/network/swarm/swarm.dart:796:7)
<asynchronous suspension>
#1      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1107:20)
<asynchronous suspension>
#2      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#3      BasicHost.newStream (package:dart_libp2p/p2p/host/basic/basic_host.dart:1216:7)
<asynchronous suspension>
#4      Libp2pRouter.sendMessage (package:dart_ipfs/src/transport/libp2p_router.dart:291:22)
<asynchronous suspension>
#5      Libp2pRouter.broadcastMessage (package:dart_ipfs/src/transport/libp2p_router.dart:386:9)
<asynchronous suspension>
#6      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:196:7)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#8      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#9      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:33.335345 [SEVERE] [basichost] ❌ [CONNECT-ERROR] Connection failed after 2ms (dial: 1ms): Exception: Failed to dial: Exception: No addresses found for peer: 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2
#0      BasicHost._dialPeer (package:dart_libp2p/p2p/host/basic/basic_host.dart:1146:7)
<asynchronous suspension>
#1      BasicHost.connect (package:dart_libp2p/p2p/host/basic/basic_host.dart:1074:7)
<asynchronous suspension>
#2      BasicHost.newStream (package:dart_libp2p/p2p/host/basic/basic_host.dart:1216:7)
<asynchronous suspension>
#3      Libp2pRouter.sendMessage (package:dart_ipfs/src/transport/libp2p_router.dart:291:22)
<asynchronous suspension>
#4      Libp2pRouter.broadcastMessage (package:dart_ipfs/src/transport/libp2p_router.dart:386:9)
<asynchronous suspension>
#5      main.<anonymous closure>.<anonymous closure> (file:///C:/Users/Eduardo/Documents/ipfs/test/transport/libp2p_router_coverage_test.dart:196:7)
<asynchronous suspension>
#6      Declarer.test.<anonymous closure>.<anonymous closure> (package:test_api/src/backend/declarer.dart:253:15)
<asynchronous suspension>
#7      Declarer.test.<anonymous closure> (package:test_api/src/backend/declarer.dart:250:11)
<asynchronous suspension>
#8      Invoker._waitForOutstandingCallbacks.<anonymous closure> (package:test_api/src/backend/invoker.dart:318:9)
<asynchronous suspension>

2026-02-02T15:35:33.335345 [SEVERE] [Libp2pRouter] [ERROR] Failed to send message to 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2
Error: Exception: Failed to dial: Exception: No addresses found for peer: 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2
Stack trace: null
2026-02-02T15:35:33.335345 [WARNING] [Libp2pRouter] [WARNING] Failed to broadcast to 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2: Exception: Failed to dial: Exception: No addresses found for peer: 12D3KooWK39Nd6yHE6xy5ZNG95ukvrQZF2axYZr6RSKoyMbAkGD2
2026-02-02T15:35:33.335345 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:35:33.335345 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:33.336344 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:33.336344 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:33.336344 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:33.336344 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:33.336344 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:33.336344 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
01:04 +914 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:04 +914 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:33.336344 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:33.336344 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:33.336344 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:33.336344 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:33.337345 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:35:33.386089 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:33.387088 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:33.389823 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:33.390827 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:33.390827 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:33.391828 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:33.393826 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:33.393826 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL - Initial _network.listenAddresses: []
2026-02-02T15:35:33.393826 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL, Host hashCode: 739596554
2026-02-02T15:35:33.393826 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:33.393826 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:33.393826 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:33.394825 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:33.394825 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:33.394825 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
01:04 +915 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:04 +916 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:04 +917 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:04 +918 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:04 +919 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:04 +920 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:04 +921 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:04 +922 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:04 +923 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:04 +924 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:04 +924 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:34.098402 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:35:34.099402 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:34.099402 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:34.099402 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:34.099402 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:34.099402 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:34.099402 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:34.099402 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:34.099402 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:34.099402 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:34.099402 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:35:34.099402 [INFO] [Config] [Config.newNode] for peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL: Host created. Listening will be handled by host.start().
2026-02-02T15:35:34.099402 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:34.099402 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL, network.hashCode: 420311321, initial network.listenAddresses: []
2026-02-02T15:35:34.099402 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.099402 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4701]. Attempting to listen via _network.listen().
2026-02-02T15:35:34.099402 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.099402 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4701] for peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:34.099402 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.100907 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4701 for peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:34.101451 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4701 with transport TCPTransport for peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:34.104462 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4701 with transport TCPTransport
2026-02-02T15:35:34.466768 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4701. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4701 for peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:34.466768 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4701 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4701
2026-02-02T15:35:34.466768 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4701. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4701] for peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:34.466768 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.466768 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4701 for peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL. This should be resolved to concrete addresses by the host.
2026-02-02T15:35:34.467767 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:34.467767 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4701
2026-02-02T15:35:34.467767 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL.
2026-02-02T15:35:34.467767 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.467767 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.467767 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.467767 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.467767 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.467767 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.467767 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:34.467767 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.467767 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.467767 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4701 (first component not IP)
2026-02-02T15:35:34.468768 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:34.468768 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4701 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4701
2026-02-02T15:35:34.468768 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4701 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4701
2026-02-02T15:35:34.468768 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.468768 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4701 (first component not IP)
2026-02-02T15:35:34.468768 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:34.468768 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL - resolvedAddrs: {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:35:34.468768 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:35:34.468768 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:35:34.468768 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL - Returning: [/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701]
2026-02-02T15:35:34.477764 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:34.522845 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.523847 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 420311321, network.listenAddresses: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.528352 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:34.529856 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL, Host hashCode: 739596554
2026-02-02T15:35:34.531861 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.531861 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.531861 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4701 (first component not IP)
2026-02-02T15:35:34.532860 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:34.532860 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4701 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4701
2026-02-02T15:35:34.532860 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4701 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4701
2026-02-02T15:35:34.532860 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.532860 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4701 (first component not IP)
2026-02-02T15:35:34.532860 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:34.532860 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL - resolvedAddrs: {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:35:34.532860 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:35:34.532860 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:35:34.533860 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL - Returning: [/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701]
2026-02-02T15:35:34.533860 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:34.533860 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:34.534859 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:34.536116 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL, Host hashCode: 739596554
2026-02-02T15:35:34.536116 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.536116 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.536116 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4701 (first component not IP)
2026-02-02T15:35:34.536116 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:34.536116 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4701 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4701
2026-02-02T15:35:34.536116 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4701 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4701
2026-02-02T15:35:34.537116 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.537116 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4701 (first component not IP)
2026-02-02T15:35:34.537116 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:34.537116 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL - resolvedAddrs: {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:35:34.538114 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:35:34.538114 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:35:34.538114 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL - Returning: [/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701]
2026-02-02T15:35:34.538114 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:34.539146 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:34.539146 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:34.539146 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:34.539146 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.539146 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 420311321, network.listenAddresses: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.540115 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.550256 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 420311321, network.listenAddresses: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.550256 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:34.551259 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:34.551259 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL, Host hashCode: 739596554
2026-02-02T15:35:34.551259 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.551259 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.551259 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4701 (first component not IP)
2026-02-02T15:35:34.551259 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:34.551259 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4701 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4701
2026-02-02T15:35:34.552259 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4701 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4701
2026-02-02T15:35:34.552259 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.552259 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4701 (first component not IP)
2026-02-02T15:35:34.552259 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:34.552259 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL - resolvedAddrs: {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:35:34.552259 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:35:34.553259 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701}
2026-02-02T15:35:34.553259 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL - Returning: [/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701]
2026-02-02T15:35:34.553259 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4701, /ip4/172.29.112.1/tcp/4701] for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:34.553259 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:34.553259 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.554259 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 420311321, network.listenAddresses: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.554259 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:34.554259 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.554259 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 420311321, network.listenAddresses: [/ip4/0.0.0.0/tcp/4701]
2026-02-02T15:35:34.554259 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:35:34.554259 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:34.554259 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4701 with ID: 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:34.610262 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:34.610680 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:34.662176 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:34.667178 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:34.713139 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:34.714139 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:34.714139 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:34.757526 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:34.793989 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:35:34.793989 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:34.822110 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:34.822110 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:34.824109 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:34.824109 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - Initial _network.listenAddresses: []
2026-02-02T15:35:34.849857 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS, Host hashCode: 101858107
2026-02-02T15:35:34.879853 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:34.896691 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:34.897356 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:34.897356 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:34.898360 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:34.900374 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:35:34.948014 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:35:34.949014 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:34.949014 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:34.949014 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:34.949014 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:34.949014 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:34.949014 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:34.949014 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:34.949014 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:34.949014 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:34.950014 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:35:34.950014 [INFO] [Config] [Config.newNode] for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS: Host created. Listening will be handled by host.start().
2026-02-02T15:35:34.950014 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:34.950014 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS, network.hashCode: 58791579, initial network.listenAddresses: []
2026-02-02T15:35:34.950014 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:34.950014 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/4702]. Attempting to listen via _network.listen().
2026-02-02T15:35:34.950014 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:34.950014 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/4702] for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:34.950014 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:34.950014 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/4702 for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:34.951013 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/4702 with transport TCPTransport for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:34.951013 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/4702 with transport TCPTransport
2026-02-02T15:35:34.985514 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/4702. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/4702 for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:34.985514 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/4702 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/4702
2026-02-02T15:35:34.986514 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/4702. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4702] for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:34.987513 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:34.987513 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/4702 for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS. This should be resolved to concrete addresses by the host.
2026-02-02T15:35:34.987513 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:34.987513 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/4702
2026-02-02T15:35:34.987513 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:34.988513 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:34.988513 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:34.988513 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:34.988513 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:34.988513 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:34.988513 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:34.988513 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:34.988513 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:34.988513 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:34.988513 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:35:34.988513 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:34.989514 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4702
2026-02-02T15:35:34.989514 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4702
2026-02-02T15:35:34.989514 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:34.989514 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:35:34.989514 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:34.989514 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - resolvedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:35:34.989514 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:35:34.989514 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:35:34.989514 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - Returning: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702]
2026-02-02T15:35:34.998510 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:34.999511 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:34.999511 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 58791579, network.listenAddresses: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.000510 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:35.000510 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS, Host hashCode: 101858107
2026-02-02T15:35:35.000510 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.000510 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.000510 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:35:35.000510 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:35.001511 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4702
2026-02-02T15:35:35.001511 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4702
2026-02-02T15:35:35.001511 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.001511 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:35:35.001511 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:35.001511 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - resolvedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:35:35.002509 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:35:35.002509 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:35:35.002509 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - Returning: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702]
2026-02-02T15:35:35.003509 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.003509 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:35.003509 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:35.003509 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS, Host hashCode: 101858107
2026-02-02T15:35:35.003509 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.003509 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.003509 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:35:35.003509 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:35.004508 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4702
2026-02-02T15:35:35.004508 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4702
2026-02-02T15:35:35.004508 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.004508 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:35:35.004508 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:35.004508 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - resolvedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:35:35.004508 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:35:35.004508 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:35:35.005508 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - Returning: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702]
2026-02-02T15:35:35.005508 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.012505 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:35.012505 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:35.012505 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:35.012505 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.012505 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 58791579, network.listenAddresses: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.012505 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.012505 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 58791579, network.listenAddresses: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.013506 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.014505 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:35.014505 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS, Host hashCode: 101858107
2026-02-02T15:35:35.014505 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.014505 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.015505 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:35:35.015505 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:35.015505 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4702
2026-02-02T15:35:35.015505 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4702
2026-02-02T15:35:35.015505 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.016504 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:35:35.016504 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:35.016504 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - resolvedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:35:35.016504 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:35:35.016504 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:35:35.016504 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - Returning: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702]
2026-02-02T15:35:35.016504 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.016504 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.027693 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.032690 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 58791579, network.listenAddresses: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.033691 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:35.035690 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.037194 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 58791579, network.listenAddresses: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.038208 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:35:35.038208 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:35.038208 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/4702 with ID: 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.039714 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:35.051762 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /ipfs/1.0.0
2026-02-02T15:35:35.055232 [FINE] [Libp2pRouter] [DEBUG] Connecting to /ip4/127.0.0.1/tcp/4702/p2p/12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.063229 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:35.073745 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS, Host hashCode: 101858107
2026-02-02T15:35:35.073745 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.073745 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.076250 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:35:35.076250 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:35.077265 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/4702
2026-02-02T15:35:35.077265 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/4702 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/4702
2026-02-02T15:35:35.084309 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/4702]
2026-02-02T15:35:35.085329 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/4702 (first component not IP)
2026-02-02T15:35:35.085329 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:35.085329 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - resolvedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:35:35.085329 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - natAppliedAddrs: {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:35:35.086328 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702}
2026-02-02T15:35:35.086328 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - Returning: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702]
2026-02-02T15:35:35.086328 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/4702, /ip4/172.29.112.1/tcp/4702] for host 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.086328 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS, existing_conns=0
2026-02-02T15:35:35.086328 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS"
2026-02-02T15:35:35.086328 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:35.087834 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
2026-02-02T15:35:35.087834 [FINE] [Swarm] Found 0 existing connections for peer ID string: "12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS"
2026-02-02T15:35:35.087834 [FINE] [Swarm] Swarm.dialPeer: No existing connection for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS. Dialing.
2026-02-02T15:35:35.089345 [FINE] [Swarm] Swarm.dialPeer: After circuit dedup: 1 addresses
2026-02-02T15:35:35.093871 [FINE] [Swarm] Dialing 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS with 1 addresses (capability: OutboundCapability.ipv4Only, relay-peer: false)
2026-02-02T15:35:35.093871 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
2026-02-02T15:35:35.093871 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:35.093871 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:35.094869 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=4, addrs=2, protocols=7
2026-02-02T15:35:35.094869 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:35.094869 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:35.101432 [FINE] [HappyEyeballsDialer] Attempting /ip4/127.0.0.1/tcp/4702 (priority 1)
2026-02-02T15:35:35.101432 [FINE] [Swarm] Swarm._dialSingleAddr: Attempting to dial 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS at /ip4/127.0.0.1/tcp/4702
2026-02-02T15:35:35.106940 [FINE] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) CREATED. IsServer: true, Direction: Direction.inbound. Socket Local: 0.0.0.0:4702, Socket Remote: 127.0.0.1:58653
2026-02-02T15:35:35.107939 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068135107-3108
2026-02-02T15:35:35.107939 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:35.108939 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(eec5b5c6) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:35.108939 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(eec5b5c6) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:35.116449 [FINE] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) CREATED. IsServer: false, Direction: Direction.outbound. Socket Local: 127.0.0.1:58653, Socket Remote: 127.0.0.1:4702
2026-02-02T15:35:35.116449 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068135116-7269
2026-02-02T15:35:35.116449 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWKYfn8zNSktJM8DshA6JxutZFwXbJs8AmwpqtChmbdZBX
2026-02-02T15:35:35.117449 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:35.118448 [FINEST] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:35.118448 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(eec5b5c6) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.118448 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(eec5b5c6) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:35:35.118448 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:35.118448 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:35.118448 [FINER] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Writing 20 bytes: 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:35.119447 [FINEST] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:35:35.119447 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:35.119447 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:35.119447 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(07047437) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:35.119447 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(07047437) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:35.119447 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 20 bytes successfully. Data preview (hex): 132f6d756c746973747265616d2f312e302e300a...
2026-02-02T15:35:35.119447 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(7fac687c) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:35.119447 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(7fac687c) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:35.121004 [FINEST] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - RAW_SOCKET_DATA_CHUNK_RECV (20 bytes): 132f6d756c746973747265616d2f312e302e300a
2026-02-02T15:35:35.121004 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(7fac687c) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.121004 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(7fac687c) END (all from buffer, length null). Returning 20 bytes: 132f6d756c746973747265616d2f312e302e300a. Buffer after: 0
2026-02-02T15:35:35.121004 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:35:35.122008 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:35:35.123007 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(7aea5e1b) START. Requested: null. Buffer: 0 bytes.
2026-02-02T15:35:35.123007 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(7aea5e1b) ASYNC WAIT. Requested: null. Buffer: 0
2026-02-02T15:35:35.123007 [FINEST] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:35:35.123007 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(07047437) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.123007 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(07047437) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:35:35.123007 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/noise"
2026-02-02T15:35:35.123007 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/noise"
2026-02-02T15:35:35.123007 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/noise". Sending acknowledgment: "/noise".
2026-02-02T15:35:35.123007 [FINER] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Writing 8 bytes: 072f6e6f6973650a
2026-02-02T15:35:35.124007 [FINEST] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Flushed 8 bytes successfully. Data preview (hex): 072f6e6f6973650a...
2026-02-02T15:35:35.124007 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/noise".
2026-02-02T15:35:35.124007 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/noise" and its handler.
2026-02-02T15:35:35.124007 [FINE] [multistream] [multistreamMuxer - handle] Protocol /noise negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:35.124007 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /noise on stream scope and stream. Proceeding to call handler.
2026-02-02T15:35:35.128516 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(ae89a60a) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.128516 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(ae89a60a) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.129515 [FINEST] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - RAW_SOCKET_DATA_CHUNK_RECV (8 bytes): 072f6e6f6973650a
2026-02-02T15:35:35.129515 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(7aea5e1b) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.129515 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(7aea5e1b) END (all from buffer, length null). Returning 8 bytes: 072f6e6f6973650a. Buffer after: 0
2026-02-02T15:35:35.134543 [INFO] [NoiseProtocol] secureOutbound: Writing msg1 (e): 32 bytes
2026-02-02T15:35:35.134543 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 34 bytes: 00206e72cb1603124fce372edcd99f47b51d65acaad65a43d48207ab5d95baa76064
2026-02-02T15:35:35.134543 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 34 bytes successfully. Data preview (hex): 00206e72cb1603124fce372edcd99f47b51d65ac...
2026-02-02T15:35:35.134543 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(b5d0d308) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.134543 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(b5d0d308) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.135543 [FINEST] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - RAW_SOCKET_DATA_CHUNK_RECV (34 bytes): 00206e72cb1603124fce372edcd99f47b51d65acaad65a43d48207ab5d95baa76064
2026-02-02T15:35:35.135543 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(ae89a60a) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.135543 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(ae89a60a) END (from buffer). Returning 2 bytes: 0020. Buffer after: 32 bytes: 6e72cb1603124fce372edcd99f47b51d65acaad65a43d48207ab5d95baa76064
2026-02-02T15:35:35.135543 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(66f9eafc) START. Requested: 32. Buffer: 32 bytes.
2026-02-02T15:35:35.135543 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(66f9eafc) END (from buffer). Returning 32 bytes: 6e72cb1603124fce372edcd99f47b51d65acaad65a43d48207ab5d95baa76064. Buffer after: 0 bytes: 
2026-02-02T15:35:35.135543 [INFO] [NoiseProtocol] secureInbound: Read msg1 (e): 32 bytes
2026-02-02T15:35:35.164356 [INFO] [NoiseProtocol] secureInbound: Writing msg2 (e,ee,s,es + payload): 200 bytes
2026-02-02T15:35:35.165356 [FINER] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Writing 202 bytes: 00c8ef0f9dbaabe6d657582416a743c3f515f2460abbdead82250b1d56b89bceb07b182fcde56a7c318cf3bd04251a21d02810c1e308f6e1f688487b974d2afbedfbf13db21987fe97cb1d3c1083d46eafaf5cff6b46ddfb11e1647353fd3ce770f1fc92fb35db28eabd6a091cd093ef47f4d9676a5cbb14fd4f70faf66da2de140033a9a8e23eb20453fd1f40f4d996bcb7706c0ad5b06c5ee5d166b510da37924ab4ae5fb608e4bbc68b437fe2de0aa2263329b1dc44fa3e903f238e194354987f6adfed0d55167243
2026-02-02T15:35:35.165356 [FINEST] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Flushed 202 bytes successfully. Data preview (hex): 00c8ef0f9dbaabe6d657582416a743c3f515f246...
2026-02-02T15:35:35.165356 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(7e16e8a2) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.165356 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(7e16e8a2) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.168355 [FINEST] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - RAW_SOCKET_DATA_CHUNK_RECV (202 bytes): 00c8ef0f9dbaabe6d657582416a743c3f515f2460abbdead82250b1d56b89bceb07b182fcde56a7c318cf3bd04251a21d02810c1e308f6e1f688487b974d2afbedfbf13db21987fe97cb1d3c1083d46eafaf5cff6b46ddfb11e1647353fd3ce770f1fc92fb35db28eabd6a091cd093ef47f4d9676a5cbb14fd4f70faf66da2de140033a9a8e23eb20453fd1f40f4d996bcb7706c0ad5b06c5ee5d166b510da37924ab4ae5fb608e4bbc68b437fe2de0aa2263329b1dc44fa3e903f238e194354987f6adfed0d55167243
2026-02-02T15:35:35.168355 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(b5d0d308) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.168355 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(b5d0d308) END (from buffer). Returning 2 bytes: 00c8. Buffer after: 200 bytes: ef0f9dbaabe6d657582416a743c3f515f2460abbdead82250b1d56b89bceb07b182fcde56a7c318cf3bd04251a21d02810c1e308f6e1f688487b974d2afbedfbf13db21987fe97cb1d3c1083d46eafaf5cff6b46ddfb11e1647353fd3ce770f1fc92fb35db28eabd6a091cd093ef47f4d9676a5cbb14fd4f70faf66da2de140033a9a8e23eb20453fd1f40f4d996bcb7706c0ad5b06c5ee5d166b510da37924ab4ae5fb608e4bbc68b437fe2de0aa2263329b1dc44fa3e903f238e194354987f6adfed0d55167243
2026-02-02T15:35:35.168355 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(2fcfa610) START. Requested: 200. Buffer: 200 bytes.
2026-02-02T15:35:35.168355 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(2fcfa610) END (from buffer). Returning 200 bytes: ef0f9dbaabe6d657582416a743c3f515f2460abbdead82250b1d56b89bceb07b182fcde56a7c318cf3bd04251a21d02810c1e308f6e1f688487b974d2afbedfbf13db21987fe97cb1d3c1083d46eafaf5cff6b46ddfb11e1647353fd3ce770f1fc92fb35db28eabd6a091cd093ef47f4d9676a5cbb14fd4f70faf66da2de140033a9a8e23eb20453fd1f40f4d996bcb7706c0ad5b06c5ee5d166b510da37924ab4ae5fb608e4bbc68b437fe2de0aa2263329b1dc44fa3e903f238e194354987f6adfed0d55167243. Buffer after: 0 bytes: 
2026-02-02T15:35:35.168355 [INFO] [NoiseProtocol] secureOutbound: Read msg2: 200 bytes
2026-02-02T15:35:35.195512 [INFO] [NoiseProtocol] secureOutbound: Writing msg3 (s,se + payload): 168 bytes
2026-02-02T15:35:35.195512 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 170 bytes: 00a802df393f82da1b7ac17deabdc4cbdc996cf6fcdfe3f51b4f079b1e3e54af0e71e69000e5d8b4e6fc080677be8234a5adba7b9b9eb99bccd44251fb6418827b3b6d685b15b9fc9f738a79af99420524262d7a17b4e209306ebc7bf5bb42c7572704764fcc5678969ea92a592bd7ac5d60115a99ab72c163e816f4c353d1bb9bc01d995e4b2a61203f074834bbddaa0efac01b993708374419e833154c64d48e26adb1622fbc9b935d
2026-02-02T15:35:35.196513 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 170 bytes successfully. Data preview (hex): 00a802df393f82da1b7ac17deabdc4cbdc996cf6...
2026-02-02T15:35:35.196513 [INFO] [NoiseProtocol] secureOutbound: Handshake complete. Remote peer: 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.196513 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:35:35.196513 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1065187257
2026-02-02T15:35:35.196513 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1059908332
2026-02-02T15:35:35.196513 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [95, 246, 1, 216, 135, 227, 242, 112, 202, 241, 214, 253, 22, 206, 190, 195, 119, 150, 255, 228, 62, 54, 71, 23, 22, 221, 221, 41, 56, 34, 192, 64]
2026-02-02T15:35:35.196513 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [196, 111, 39, 56, 13, 151, 79, 154, 112, 223, 4, 202, 83, 225, 2, 137, 100, 5, 79, 36, 20, 48, 160, 93, 8, 107, 75, 219, 116, 80, 189, 210]
2026-02-02T15:35:35.196513 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:35.197512 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:35:35.197512 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:35:35.197512 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:35:35.197512 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 38 bytes: 00243cc0987464fba345818c3b23955a2f6e8d967227505ea79f57417385c18068eb8ec575ec
2026-02-02T15:35:35.199513 [FINEST] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - RAW_SOCKET_DATA_CHUNK_RECV (208 bytes): 00a802df393f82da1b7ac17deabdc4cbdc996cf6fcdfe3f51b4f079b1e3e54af0e71e69000e5d8b4e6fc080677be8234a5adba7b9b9eb99bccd44251fb6418827b3b6d685b15b9fc9f738a79af99420524262d7a17b4e209306ebc7bf5bb42c7572704764fcc5678969ea92a592bd7ac5d60115a99ab72c163e816f4c353d1bb9bc01d995e4b2a61203f074834bbddaa0efac01b993708374419e833154c64d48e26adb1622fbc9b935d00243cc0987464fba345818c3b23955a2f6e8d967227505ea79f57417385c18068eb8ec575ec
2026-02-02T15:35:35.200017 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(7e16e8a2) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.200017 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(7e16e8a2) END (from buffer). Returning 2 bytes: 00a8. Buffer after: 206 bytes: 02df393f82da1b7ac17deabdc4cbdc996cf6fcdfe3f51b4f079b1e3e54af0e71e69000e5d8b4e6fc080677be8234a5adba7b9b9eb99bccd44251fb6418827b3b6d685b15b9fc9f738a79af99420524262d7a17b4e209306ebc7bf5bb42c7572704764fcc5678969ea92a592bd7ac5d60115a99ab72c163e816f4c353d1bb9bc01d995e4b2a61203f074834bbddaa0efac01b993708374419e833154c64d48e26adb1622fbc9b935d00243cc0987464fba345818c3b23955a2f6e8d967227505ea79f57417385c18068eb8ec575ec
2026-02-02T15:35:35.200017 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(5becd7de) START. Requested: 168. Buffer: 206 bytes.
2026-02-02T15:35:35.200017 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(5becd7de) END (from buffer). Returning 168 bytes: 02df393f82da1b7ac17deabdc4cbdc996cf6fcdfe3f51b4f079b1e3e54af0e71e69000e5d8b4e6fc080677be8234a5adba7b9b9eb99bccd44251fb6418827b3b6d685b15b9fc9f738a79af99420524262d7a17b4e209306ebc7bf5bb42c7572704764fcc5678969ea92a592bd7ac5d60115a99ab72c163e816f4c353d1bb9bc01d995e4b2a61203f074834bbddaa0efac01b993708374419e833154c64d48e26adb1622fbc9b935d. Buffer after: 38 bytes: 00243cc0987464fba345818c3b23955a2f6e8d967227505ea79f57417385c18068eb8ec575ec
2026-02-02T15:35:35.200017 [INFO] [NoiseProtocol] secureInbound: Read msg3: 168 bytes
2026-02-02T15:35:35.214125 [INFO] [NoiseProtocol] secureInbound: Handshake complete. Remote peer: 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:35.214125 [FINER] [SecuredConnection] SecuredConnection Constructor: Peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL, initialSendNonce=0, initialRecvNonce=0
2026-02-02T15:35:35.214125 [FINER] [SecuredConnection]   - _encryptionKey.hashCode: 1059908332
2026-02-02T15:35:35.215096 [FINER] [SecuredConnection]   - _decryptionKey.hashCode: 1065187257
2026-02-02T15:35:35.215096 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:35.215096 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:35.215096 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.215096 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.215096 [FINER] [SecuredConnection]   - _encryptionKey.bytes: [196, 111, 39, 56, 13, 151, 79, 154, 112, 223, 4, 202, 83, 225, 2, 137, 100, 5, 79, 36, 20, 48, 160, 93, 8, 107, 75, 219, 116, 80, 189, 210]
2026-02-02T15:35:35.215096 [FINER] [SecuredConnection]   - _decryptionKey.bytes: [95, 246, 1, 216, 135, 227, 242, 112, 202, 241, 214, 253, 22, 206, 190, 195, 119, 150, 255, 228, 62, 54, 71, 23, 22, 221, 221, 41, 56, 34, 192, 64]
2026-02-02T15:35:35.215096 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.215096 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:35.215096 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:35.215096 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.215096 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.216124 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(6c4e17b2) START. Requested: 2. Buffer: 38 bytes.
2026-02-02T15:35:35.216124 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(6c4e17b2) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 3cc0987464fba345818c3b23955a2f6e8d967227505ea79f57417385c18068eb8ec575ec
2026-02-02T15:35:35.216124 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:35:35.216124 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.216124 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:35:35.216124 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:35:35.216124 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:35:35.216124 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:35:35.216124 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:35:35.216124 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(072d2265) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:35:35.216124 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(072d2265) END (from buffer). Returning 36 bytes: 3cc0987464fba345818c3b23955a2f6e8d967227505ea79f57417385c18068eb8ec575ec. Buffer after: 0 bytes: 
2026-02-02T15:35:35.216124 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [60, 192, 152, 116]
2026-02-02T15:35:35.216124 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:35:35.217123 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 3cc0987464fba345818c3b23955a2f6e8d967227505ea79f57417385c18068eb8ec575ec
2026-02-02T15:35:35.217123 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:35:35.217123 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:35:35.217123 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 3cc0987464fba345818c3b23955a2f6e8d967227
2026-02-02T15:35:35.217123 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 505ea79f57417385c18068eb8ec575ec
2026-02-02T15:35:35.217123 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [60, 192, 152, 116]
2026-02-02T15:35:35.217123 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [80, 94, 167, 159]
2026-02-02T15:35:35.217123 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [80, 94, 167, 159, 87, 65, 115, 133, 193, 128, 104, 235, 142, 197, 117, 236]
2026-02-02T15:35:35.217123 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.217123 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065187257): [95, 246, 1, 216, 135, 227, 242, 112, 202, 241, 214, 253, 22, 206, 190, 195, 119, 150, 255, 228, 62, 54, 71, 23, 22, 221, 221, 41, 56, 34, 192, 64]
2026-02-02T15:35:35.217123 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:35:35.217123 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:35.217123 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:35.217123 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.217123 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:35.218124 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:35.218124 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 20, first 20 bytes: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:35.218124 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=0
2026-02-02T15:35:35.218124 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 36 bytes (plaintext was 20)
2026-02-02T15:35:35.218124 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 38
2026-02-02T15:35:35.218124 [FINER] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Writing 38 bytes: 002498de17f048a63cb206bc4807a09420b6566aa674958caedd4aebc078bb6e4e81a3da3c4b
2026-02-02T15:35:35.219123 [FINEST] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Flushed 38 bytes successfully. Data preview (hex): 002498de17f048a63cb206bc4807a09420b6566a...
2026-02-02T15:35:35.219123 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:35.219123 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:35.219123 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:35.219123 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.220123 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.220123 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.220123 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:35.220123 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:35.220123 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.220123 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.220123 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(94e7a30e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.220123 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(94e7a30e) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.220123 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 38 bytes successfully. Data preview (hex): 00243cc0987464fba345818c3b23955a2f6e8d96...
2026-02-02T15:35:35.220123 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:35.221530 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.221530 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.221530 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.221530 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:35.221530 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:35.221530 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.221530 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.221530 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(5b2f3e03) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.221530 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(5b2f3e03) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.226060 [FINEST] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - RAW_SOCKET_DATA_CHUNK_RECV (38 bytes): 002498de17f048a63cb206bc4807a09420b6566aa674958caedd4aebc078bb6e4e81a3da3c4b
2026-02-02T15:35:35.226060 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(5b2f3e03) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.227064 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(5b2f3e03) END (from buffer). Returning 2 bytes: 0024. Buffer after: 36 bytes: 98de17f048a63cb206bc4807a09420b6566aa674958caedd4aebc078bb6e4e81a3da3c4b
2026-02-02T15:35:35.227064 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 36]
2026-02-02T15:35:35.227064 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.227064 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 36]
2026-02-02T15:35:35.227064 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0024
2026-02-02T15:35:35.227064 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 36
2026-02-02T15:35:35.227064 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 36
2026-02-02T15:35:35.227064 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 36 more bytes (have 0/36)
2026-02-02T15:35:35.228064 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(d22cfe6d) START. Requested: 36. Buffer: 36 bytes.
2026-02-02T15:35:35.228064 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(d22cfe6d) END (from buffer). Returning 36 bytes: 98de17f048a63cb206bc4807a09420b6566aa674958caedd4aebc078bb6e4e81a3da3c4b. Buffer after: 0 bytes: 
2026-02-02T15:35:35.229063 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 36 bytes. First 4 bytes: [152, 222, 23, 240]
2026-02-02T15:35:35.229063 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 36, Got: 36
2026-02-02T15:35:35.229063 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 36, Bytes: 98de17f048a63cb206bc4807a09420b6566aa674958caedd4aebc078bb6e4e81a3da3c4b
2026-02-02T15:35:35.229063 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 36
2026-02-02T15:35:35.230063 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(20) and MAC(16)
2026-02-02T15:35:35.230063 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 98de17f048a63cb206bc4807a09420b6566aa674
2026-02-02T15:35:35.230063 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 958caedd4aebc078bb6e4e81a3da3c4b
2026-02-02T15:35:35.230063 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [152, 222, 23, 240]
2026-02-02T15:35:35.230063 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [149, 140, 174, 221]
2026-02-02T15:35:35.230063 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [149, 140, 174, 221, 74, 235, 192, 120, 187, 110, 78, 129, 163, 218, 60, 75]
2026-02-02T15:35:35.230063 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=0 ([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.230063 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059908332): [196, 111, 39, 56, 13, 151, 79, 154, 112, 223, 4, 202, 83, 225, 2, 137, 100, 5, 79, 36, 20, 48, 160, 93, 8, 107, 75, 219, 116, 80, 189, 210]
2026-02-02T15:35:35.230063 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=0, got 20 bytes
2026-02-02T15:35:35.230063 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 20. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:35.231064 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:35.231064 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.231064 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:35.231064 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:35:35.231064 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:35:35.231064 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:35:35.231064 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 32 bytes: 001e8e0032cd9bc50763a0f78a7e18fcf6ce2571d2729cc0fd9fd7e229c04ef5
2026-02-02T15:35:35.232062 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 32 bytes successfully. Data preview (hex): 001e8e0032cd9bc50763a0f78a7e18fcf6ce2571...
2026-02-02T15:35:35.232062 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=null
2026-02-02T15:35:35.232062 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.232062 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.232062 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.232062 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=null
2026-02-02T15:35:35.232062 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: null, _decryptedBuffer.length: 0
2026-02-02T15:35:35.232062 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.232062 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.233063 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(442919b9) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.233063 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(442919b9) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.233063 [FINEST] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e8e0032cd9bc50763a0f78a7e18fcf6ce2571d2729cc0fd9fd7e229c04ef5
2026-02-02T15:35:35.234061 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(94e7a30e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.234061 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(94e7a30e) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 8e0032cd9bc50763a0f78a7e18fcf6ce2571d2729cc0fd9fd7e229c04ef5
2026-02-02T15:35:35.234061 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:35:35.234061 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.234061 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:35:35.234061 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:35:35.234061 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:35:35.234061 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:35:35.234061 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:35:35.234061 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(5617d5c8) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:35:35.234061 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(5617d5c8) END (from buffer). Returning 30 bytes: 8e0032cd9bc50763a0f78a7e18fcf6ce2571d2729cc0fd9fd7e229c04ef5. Buffer after: 0 bytes: 
2026-02-02T15:35:35.234061 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [142, 0, 50, 205]
2026-02-02T15:35:35.234061 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:35:35.234061 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 8e0032cd9bc50763a0f78a7e18fcf6ce2571d2729cc0fd9fd7e229c04ef5
2026-02-02T15:35:35.234061 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:35:35.235062 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:35:35.235062 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 8e0032cd9bc50763a0f78a7e18fc
2026-02-02T15:35:35.235062 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: f6ce2571d2729cc0fd9fd7e229c04ef5
2026-02-02T15:35:35.235062 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [142, 0, 50, 205]
2026-02-02T15:35:35.235062 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [246, 206, 37, 113]
2026-02-02T15:35:35.235062 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [246, 206, 37, 113, 210, 114, 156, 192, 253, 159, 215, 226, 41, 192, 78, 245]
2026-02-02T15:35:35.235062 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.235062 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065187257): [95, 246, 1, 216, 135, 227, 242, 112, 202, 241, 214, 253, 22, 206, 190, 195, 119, 150, 255, 228, 62, 54, 71, 23, 22, 221, 221, 41, 56, 34, 192, 64]
2026-02-02T15:35:35.235062 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:35:35.235062 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:35.236061 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:35.236061 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.236061 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/yamux/1.0.0"
2026-02-02T15:35:35.236061 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/yamux/1.0.0"
2026-02-02T15:35:35.236061 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/yamux/1.0.0". Sending acknowledgment: "/yamux/1.0.0".
2026-02-02T15:35:35.237060 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 14, first 20 bytes: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10])
2026-02-02T15:35:35.237060 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=1
2026-02-02T15:35:35.238060 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 30 bytes (plaintext was 14)
2026-02-02T15:35:35.238060 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 32
2026-02-02T15:35:35.238060 [FINER] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Writing 32 bytes: 001e2708c604f8ff080eb3edab68d0d2dcfc9b5df9ceb5f36d5fdf9c171760cd
2026-02-02T15:35:35.241059 [FINEST] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Flushed 32 bytes successfully. Data preview (hex): 001e2708c604f8ff080eb3edab68d0d2dcfc9b5d...
2026-02-02T15:35:35.241059 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/yamux/1.0.0".
2026-02-02T15:35:35.242059 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/yamux/1.0.0" and its handler.
2026-02-02T15:35:35.247057 [FINE] [multistream] [multistreamMuxer - handle] Protocol /yamux/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:35.247057 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /yamux/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:35:35.248056 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:35.248056 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068135248-3108
2026-02-02T15:35:35.248056 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:35.248056 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:35:35.248056 [FINE] [SwarmConn] SwarmConn (0): Context set: 7e82415a-b8f6-4416-a692-8c6c8e50b2b6
2026-02-02T15:35:35.248056 [FINE] [Swarm] Storing inbound connection for peer=12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL, conn_id=0
2026-02-02T15:35:35.248056 [FINE] [Swarm] Connection stored. Total connections for "12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL": 1
2026-02-02T15:35:35.248056 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL. Conn ID: 0, Direction: Direction.inbound
2026-02-02T15:35:35.249057 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL.
2026-02-02T15:35:35.249057 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL. Conn ID: 0
2026-02-02T15:35:35.249057 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL.
2026-02-02T15:35:35.249057 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL.
2026-02-02T15:35:35.249057 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:35.249057 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Inbound connection from 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL. This peer is the LISTENER - waiting for remote to initiate identify protocol.
2026-02-02T15:35:35.250057 [FINEST] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - RAW_SOCKET_DATA_CHUNK_RECV (32 bytes): 001e2708c604f8ff080eb3edab68d0d2dcfc9b5df9ceb5f36d5fdf9c171760cd
2026-02-02T15:35:35.250057 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(442919b9) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.250057 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(442919b9) END (from buffer). Returning 2 bytes: 001e. Buffer after: 30 bytes: 2708c604f8ff080eb3edab68d0d2dcfc9b5df9ceb5f36d5fdf9c171760cd
2026-02-02T15:35:35.250057 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 30]
2026-02-02T15:35:35.250057 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.250057 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 30]
2026-02-02T15:35:35.250057 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001e
2026-02-02T15:35:35.250057 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 30
2026-02-02T15:35:35.250057 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 30
2026-02-02T15:35:35.250057 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 30 more bytes (have 0/30)
2026-02-02T15:35:35.250057 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(7dad839e) START. Requested: 30. Buffer: 30 bytes.
2026-02-02T15:35:35.250057 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(7dad839e) END (from buffer). Returning 30 bytes: 2708c604f8ff080eb3edab68d0d2dcfc9b5df9ceb5f36d5fdf9c171760cd. Buffer after: 0 bytes: 
2026-02-02T15:35:35.250057 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 30 bytes. First 4 bytes: [39, 8, 198, 4]
2026-02-02T15:35:35.250057 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 30, Got: 30
2026-02-02T15:35:35.250057 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 30, Bytes: 2708c604f8ff080eb3edab68d0d2dcfc9b5df9ceb5f36d5fdf9c171760cd
2026-02-02T15:35:35.250057 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 30
2026-02-02T15:35:35.250057 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(14) and MAC(16)
2026-02-02T15:35:35.250057 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 2708c604f8ff080eb3edab68d0d2
2026-02-02T15:35:35.251056 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: dcfc9b5df9ceb5f36d5fdf9c171760cd
2026-02-02T15:35:35.251056 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [39, 8, 198, 4]
2026-02-02T15:35:35.251056 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [220, 252, 155, 93]
2026-02-02T15:35:35.251056 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [220, 252, 155, 93, 249, 206, 181, 243, 109, 95, 223, 156, 23, 23, 96, 205]
2026-02-02T15:35:35.251056 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=1 ([0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.251056 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059908332): [196, 111, 39, 56, 13, 151, 79, 154, 112, 223, 4, 202, 83, 225, 2, 137, 100, 5, 79, 36, 20, 48, 160, 93, 8, 107, 75, 219, 116, 80, 189, 210]
2026-02-02T15:35:35.251056 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=1, got 14 bytes
2026-02-02T15:35:35.251056 [FINER] [SecuredConnection] SecuredConnection.read (length=null): Returning directly from _readAndDecryptMessage, length 14. Data preview: [13, 47, 121, 97, 109, 117, 120, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:35.251056 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=null
2026-02-02T15:35:35.251056 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.251056 [FINE] [ResourceManagerImpl] Creating new peer scope: 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.252057 [FINE] [Swarm] Swarm._dialSingleAddr: Successfully dialed and upgraded connection to 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS at /ip4/127.0.0.1/tcp/4702
2026-02-02T15:35:35.252057 [FINE] [HappyEyeballsDialer] Connected via /ip4/127.0.0.1/tcp/4702
2026-02-02T15:35:35.252057 [FINE] [Swarm] Swarm.dialPeer: Successfully connected to 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.252057 [FINE] [ResourceManagerImpl] Opened connection scope: conn-1770068135252-7269
2026-02-02T15:35:35.252057 [FINE] [SwarmConn] SwarmConn (0): Setting up health monitoring for connection to 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.252057 [FINE] [SwarmConn] SwarmConn (0): Connection monitoring setup for UpgradedConnectionImpl
2026-02-02T15:35:35.252057 [FINE] [SwarmConn] SwarmConn (0): Context set: f3a360cf-7f58-4e97-b295-f8454029d766
2026-02-02T15:35:35.252057 [INFO] [Swarm] Swarm.dialPeer: Dial latency for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS: 158ms
2026-02-02T15:35:35.253663 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.253663 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.253663 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.253663 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.253663 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.253663 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.254668 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.254668 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.254668 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.254668 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(00551190) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.254668 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(00551190) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.254668 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.254668 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.254668 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.254668 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.254668 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.254668 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.254668 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.254668 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.254668 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.254668 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(88405037) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.254668 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(88405037) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.263508 [FINE] [identify.notifiee] Identify.Notifiee.connected: Connection established with 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS. Conn ID: 0, Direction: Direction.outbound
2026-02-02T15:35:35.263508 [FINER] [identify.notifiee] Identify.Notifiee.connected: Acquired _connsMutex for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:35.264042 [FINER] [identify] IdentifyService._addConnWithLock: Adding connection for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS. Conn ID: 0
2026-02-02T15:35:35.264042 [FINER] [identify] IdentifyService._addConnWithLock: Creating new Entry object for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:35.264042 [FINER] [identify.notifiee] Identify.Notifiee.connected: Released _connsMutex for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:35.264042 [FINE] [identify.notifiee] 🔧 [IDENTIFY-COORDINATION] Outbound connection to 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS. This peer is the DIALER - initiating identify protocol.
2026-02-02T15:35:35.264556 [FINE] [SwarmConn] SwarmConn.newStream (0): Entered to peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS. Context HashCode: 468762345
2026-02-02T15:35:35.264556 [FINE] [SwarmConn] SwarmConn.newStream (0): Connection is open.
2026-02-02T15:35:35.264556 [FINE] [SwarmConn] SwarmConn.newStream (0): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:35:35.264556 [FINE] [SwarmConn] SwarmConn.newStream (0): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:35:35.264556 [FINE] [YamuxStream] [7][Client] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:35.265413 [FINE] [Libp2pRouter] [DEBUG] Peer connected: 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.265413 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:35.265413 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:35:35.265413 [FINE] [Swarm] Swarm.dialPeer: Connection established for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS. Conn ID: 0
2026-02-02T15:35:35.265413 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:35.265413 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:35.266417 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 30 bytes: 001c6aae26270678b0558d84f0206be0b99a316f3fc9085484be1e58dc38
2026-02-02T15:35:35.266417 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 30 bytes successfully. Data preview (hex): 001c6aae26270678b0558d84f0206be0b99a316f...
2026-02-02T15:35:35.266417 [FINEST] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c6aae26270678b0558d84f0206be0b99a316f3fc9085484be1e58dc38
2026-02-02T15:35:35.266417 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(00551190) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.266417 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(00551190) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 6aae26270678b0558d84f0206be0b99a316f3fc9085484be1e58dc38
2026-02-02T15:35:35.267417 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:35.267417 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.267417 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:35.267417 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:35.267417 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:35.267417 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:35.267417 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:35.267417 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(2772ed91) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:35.267417 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(2772ed91) END (from buffer). Returning 28 bytes: 6aae26270678b0558d84f0206be0b99a316f3fc9085484be1e58dc38. Buffer after: 0 bytes: 
2026-02-02T15:35:35.267417 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [106, 174, 38, 39]
2026-02-02T15:35:35.267417 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:35.268417 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 6aae26270678b0558d84f0206be0b99a316f3fc9085484be1e58dc38
2026-02-02T15:35:35.268417 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:35.268417 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:35.268417 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 6aae26270678b0558d84f020
2026-02-02T15:35:35.268417 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 6be0b99a316f3fc9085484be1e58dc38
2026-02-02T15:35:35.268417 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [106, 174, 38, 39]
2026-02-02T15:35:35.268417 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [107, 224, 185, 154]
2026-02-02T15:35:35.268417 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [107, 224, 185, 154, 49, 111, 63, 201, 8, 84, 132, 190, 30, 88, 220, 56]
2026-02-02T15:35:35.268417 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.268417 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065187257): [95, 246, 1, 216, 135, 227, 242, 112, 202, 241, 214, 253, 22, 206, 190, 195, 119, 150, 255, 228, 62, 54, 71, 23, 22, 221, 221, 41, 56, 34, 192, 64]
2026-02-02T15:35:35.268417 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:35:35.268417 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:35.269416 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:35.269416 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.269416 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.269416 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:35.269416 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=2
2026-02-02T15:35:35.269416 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:35.269416 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:35.269416 [FINER] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Writing 30 bytes: 001c87b98ff549b576f14f9272853bb5ef99149dff5112b3574c8cdaaa88
2026-02-02T15:35:35.270416 [FINEST] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Flushed 30 bytes successfully. Data preview (hex): 001c87b98ff549b576f14f9272853bb5ef99149d...
2026-02-02T15:35:35.270416 [FINE] [YamuxStream] [6][Server] StreamID=1 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:35.270416 [FINER] [YamuxStream] [6][Server] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:35:35.270416 [FINE] [YamuxStream] [6][Server] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:35.270416 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:35:35.271415 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:35:35.271415 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:35.271415 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:35.271415 [FINER] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Writing 30 bytes: 001c8b098d14657334a31d7d310ebf101dbae529271642beb51df5d63b92
2026-02-02T15:35:35.271415 [FINEST] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Flushed 30 bytes successfully. Data preview (hex): 001c8b098d14657334a31d7d310ebf101dbae529...
2026-02-02T15:35:35.271415 [FINER] [YamuxStream] [6][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:35:35.271415 [FINE] [Swarm] Accepted inbound stream 1 from 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL on conn 0
2026-02-02T15:35:35.271415 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068135271-3260 for peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:35.272921 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:35.272921 [FINEST] [YamuxStream] [6][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:35.272921 [FINEST] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - RAW_SOCKET_DATA_CHUNK_RECV (60 bytes): 001c87b98ff549b576f14f9272853bb5ef99149dff5112b3574c8cdaaa88001c8b098d14657334a31d7d310ebf101dbae529271642beb51df5d63b92
2026-02-02T15:35:35.273941 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(88405037) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.273941 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(88405037) END (from buffer). Returning 2 bytes: 001c. Buffer after: 58 bytes: 87b98ff549b576f14f9272853bb5ef99149dff5112b3574c8cdaaa88001c8b098d14657334a31d7d310ebf101dbae529271642beb51df5d63b92
2026-02-02T15:35:35.273941 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:35.273941 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.273941 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:35.273941 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:35.273941 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:35.273941 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:35.273941 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:35.273941 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(cff5e22a) START. Requested: 28. Buffer: 58 bytes.
2026-02-02T15:35:35.273941 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(cff5e22a) END (from buffer). Returning 28 bytes: 87b98ff549b576f14f9272853bb5ef99149dff5112b3574c8cdaaa88. Buffer after: 30 bytes: 001c8b098d14657334a31d7d310ebf101dbae529271642beb51df5d63b92
2026-02-02T15:35:35.273941 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [135, 185, 143, 245]
2026-02-02T15:35:35.274940 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:35.274940 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 87b98ff549b576f14f9272853bb5ef99149dff5112b3574c8cdaaa88
2026-02-02T15:35:35.274940 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:35.274940 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:35.274940 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 87b98ff549b576f14f927285
2026-02-02T15:35:35.274940 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 3bb5ef99149dff5112b3574c8cdaaa88
2026-02-02T15:35:35.274940 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [135, 185, 143, 245]
2026-02-02T15:35:35.274940 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [59, 181, 239, 153]
2026-02-02T15:35:35.275942 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [59, 181, 239, 153, 20, 157, 255, 81, 18, 179, 87, 76, 140, 218, 170, 136]
2026-02-02T15:35:35.275942 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=2 ([0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.275942 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059908332): [196, 111, 39, 56, 13, 151, 79, 154, 112, 223, 4, 202, 83, 225, 2, 137, 100, 5, 79, 36, 20, 48, 160, 93, 8, 107, 75, 219, 116, 80, 189, 210]
2026-02-02T15:35:35.276447 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=2, got 12 bytes
2026-02-02T15:35:35.276447 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:35.276447 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:35.276447 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.276447 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.276447 [FINER] [YamuxStream] [7][Client] StreamID=1 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:35:35.276447 [FINER] [YamuxStream] [7][Client] StreamID=1 open() called. Current state: YamuxStreamState.init
2026-02-02T15:35:35.276447 [FINE] [YamuxStream] [7][Client] StreamID=1 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:35.277451 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0])
2026-02-02T15:35:35.277451 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=3
2026-02-02T15:35:35.277451 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:35.277451 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:35.277451 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 30 bytes: 001c19a7ecdf6928482b5780881e953282f7e94e692aafb3aff093bf758b
2026-02-02T15:35:35.277451 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 30 bytes successfully. Data preview (hex): 001c19a7ecdf6928482b5780881e953282f7e94e...
2026-02-02T15:35:35.277451 [FINE] [SwarmConn] SwarmConn.newStream (0): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 1
2026-02-02T15:35:35.277451 [FINE] [SwarmConn] SwarmConn.newStream (0): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 1.
2026-02-02T15:35:35.278451 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068135278-3708 for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.278451 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:35:35.278451 [INFO] [ConnectionHealthMetrics] Connection health state changed: ConnectionHealthState.unknown -> ConnectionHealthState.healthy
2026-02-02T15:35:35.278451 [FINE] [identify]  [IDENTIFY-STREAM-CREATE] peer=12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS, stream_id=1, protocol=/ipfs/id/1.0.0, duration=13ms
2026-02-02T15:35:35.278451 [FINE] [YamuxStream] [7][Client] StreamID=1 setDeadline() set to 2026-02-02T15:36:05.278451
2026-02-02T15:35:35.278451 [FINE] [YamuxStream] [7][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:35:35.278451 [INFO] [SwarmConn] SwarmConn (0): Health state changed to ConnectionHealthState.healthy for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.279451 [INFO] [Swarm] Swarm: Connection health changed for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS (0): ConnectionHealthState.healthy -> ConnectionHealthState.healthy
2026-02-02T15:35:35.279451 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:35.279451 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:35:35.280449 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:35.280449 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:35.280449 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 50 bytes: 0030e6e918d4d8e4751a7d2bbde5ff93780187fe376f654822cae481f7574dbd303a2a4ceb89676962d2f031bddcf826ff13
2026-02-02T15:35:35.280449 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.280449 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.280449 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.280449 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.280449 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.280449 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.280449 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.280449 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.280449 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.280449 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(7996866b) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.280449 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(7996866b) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.281954 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.281954 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.281954 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.281954 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.281954 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.281954 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.282472 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.282472 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.282472 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.282472 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(e0afa8eb) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:35.282472 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(e0afa8eb) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 8b098d14657334a31d7d310ebf101dbae529271642beb51df5d63b92
2026-02-02T15:35:35.282472 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:35.282472 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.282472 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:35.282472 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:35.282472 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:35.282472 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:35.282472 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:35.282472 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(fcb44f28) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:35.282472 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(fcb44f28) END (from buffer). Returning 28 bytes: 8b098d14657334a31d7d310ebf101dbae529271642beb51df5d63b92. Buffer after: 0 bytes: 
2026-02-02T15:35:35.282472 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [139, 9, 141, 20]
2026-02-02T15:35:35.282472 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:35.282472 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 8b098d14657334a31d7d310ebf101dbae529271642beb51df5d63b92
2026-02-02T15:35:35.282472 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:35.283481 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:35.283481 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 8b098d14657334a31d7d310e
2026-02-02T15:35:35.283481 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: bf101dbae529271642beb51df5d63b92
2026-02-02T15:35:35.283481 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [139, 9, 141, 20]
2026-02-02T15:35:35.283481 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [191, 16, 29, 186]
2026-02-02T15:35:35.283481 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [191, 16, 29, 186, 229, 41, 39, 22, 66, 190, 181, 29, 245, 214, 59, 146]
2026-02-02T15:35:35.283481 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.283481 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059908332): [196, 111, 39, 56, 13, 151, 79, 154, 112, 223, 4, 202, 83, 225, 2, 137, 100, 5, 79, 36, 20, 48, 160, 93, 8, 107, 75, 219, 116, 80, 189, 210]
2026-02-02T15:35:35.283481 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:35:35.283481 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:35.283481 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:35:35.283481 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.283481 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.283481 [FINER] [YamuxStream] [7][Client] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:35:35.283481 [FINEST] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - RAW_SOCKET_DATA_CHUNK_RECV (80 bytes): 001c19a7ecdf6928482b5780881e953282f7e94e692aafb3aff093bf758b0030e6e918d4d8e4751a7d2bbde5ff93780187fe376f654822cae481f7574dbd303a2a4ceb89676962d2f031bddcf826ff13
2026-02-02T15:35:35.284985 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(7996866b) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.284985 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(7996866b) END (from buffer). Returning 2 bytes: 001c. Buffer after: 78 bytes: 19a7ecdf6928482b5780881e953282f7e94e692aafb3aff093bf758b0030e6e918d4d8e4751a7d2bbde5ff93780187fe376f654822cae481f7574dbd303a2a4ceb89676962d2f031bddcf826ff13
2026-02-02T15:35:35.284985 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:35.284985 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.284985 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:35.284985 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:35.284985 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:35.284985 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:35.284985 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:35.284985 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(5232c769) START. Requested: 28. Buffer: 78 bytes.
2026-02-02T15:35:35.284985 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(5232c769) END (from buffer). Returning 28 bytes: 19a7ecdf6928482b5780881e953282f7e94e692aafb3aff093bf758b. Buffer after: 50 bytes: 0030e6e918d4d8e4751a7d2bbde5ff93780187fe376f654822cae481f7574dbd303a2a4ceb89676962d2f031bddcf826ff13
2026-02-02T15:35:35.284985 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [25, 167, 236, 223]
2026-02-02T15:35:35.284985 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:35.284985 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 19a7ecdf6928482b5780881e953282f7e94e692aafb3aff093bf758b
2026-02-02T15:35:35.286003 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:35.286003 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:35.286003 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 19a7ecdf6928482b5780881e
2026-02-02T15:35:35.286003 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 953282f7e94e692aafb3aff093bf758b
2026-02-02T15:35:35.286003 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [25, 167, 236, 223]
2026-02-02T15:35:35.286003 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [149, 50, 130, 247]
2026-02-02T15:35:35.286003 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [149, 50, 130, 247, 233, 78, 105, 42, 175, 179, 175, 240, 147, 191, 117, 139]
2026-02-02T15:35:35.286003 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=3 ([0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.286003 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065187257): [95, 246, 1, 216, 135, 227, 242, 112, 202, 241, 214, 253, 22, 206, 190, 195, 119, 150, 255, 228, 62, 54, 71, 23, 22, 221, 221, 41, 56, 34, 192, 64]
2026-02-02T15:35:35.286003 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=3, got 12 bytes
2026-02-02T15:35:35.286003 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:35.286003 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 1, 0, 4, 0, 0]
2026-02-02T15:35:35.286003 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.286003 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.287003 [FINER] [YamuxStream] [6][Server] StreamID=1 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:35:35.287003 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 50 bytes successfully. Data preview (hex): 0030e6e918d4d8e4751a7d2bbde5ff93780187fe...
2026-02-02T15:35:35.287003 [FINE] [YamuxStream] [7][Client] StreamID=1 Direct write: Successfully wrote all 20 bytes in 8ms
2026-02-02T15:35:35.287003 [FINEST] [YamuxStream] [7][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:35.288004 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.288004 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.288004 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.288004 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.288004 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.288004 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.288004 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.288004 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.288004 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.288004 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(8f831fc6) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.288004 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(8f831fc6) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.288004 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.288004 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.288004 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.289030 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.289030 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.289030 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.289030 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.289030 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.289030 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.289030 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(a971ae5d) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:35:35.289030 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(a971ae5d) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: e6e918d4d8e4751a7d2bbde5ff93780187fe376f654822cae481f7574dbd303a2a4ceb89676962d2f031bddcf826ff13
2026-02-02T15:35:35.289030 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:35.289030 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.289030 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:35.289030 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:35.289030 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:35.289030 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:35.289030 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:35.289030 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(18940935) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:35.289030 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(18940935) END (from buffer). Returning 48 bytes: e6e918d4d8e4751a7d2bbde5ff93780187fe376f654822cae481f7574dbd303a2a4ceb89676962d2f031bddcf826ff13. Buffer after: 0 bytes: 
2026-02-02T15:35:35.290030 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [230, 233, 24, 212]
2026-02-02T15:35:35.290030 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:35.290030 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: e6e918d4d8e4751a7d2bbde5ff93780187fe376f654822cae481f7574dbd303a2a4ceb89676962d2f031bddcf826ff13
2026-02-02T15:35:35.290030 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:35.290030 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:35.290030 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: e6e918d4d8e4751a7d2bbde5ff93780187fe376f654822cae481f7574dbd303a
2026-02-02T15:35:35.290030 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2a4ceb89676962d2f031bddcf826ff13
2026-02-02T15:35:35.290030 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [230, 233, 24, 212]
2026-02-02T15:35:35.290030 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [42, 76, 235, 137]
2026-02-02T15:35:35.290534 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [42, 76, 235, 137, 103, 105, 98, 210, 240, 49, 189, 220, 248, 38, 255, 19]
2026-02-02T15:35:35.290534 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.290534 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065187257): [95, 246, 1, 216, 135, 227, 242, 112, 202, 241, 214, 253, 22, 206, 190, 195, 119, 150, 255, 228, 62, 54, 71, 23, 22, 221, 221, 41, 56, 34, 192, 64]
2026-02-02T15:35:35.290534 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:35:35.290534 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:35.291037 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:35:35.291037 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.291037 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.291037 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:35.291037 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.291037 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.291555 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.291555 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:35.291555 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:35.291555 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:35.291555 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:35.291555 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.291555 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:35.291555 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:35.291555 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:35.291555 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:35.291555 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:35.291555 [FINE] [YamuxStream] [6][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:35:35.292686 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:35.292686 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=4
2026-02-02T15:35:35.292686 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:35.292686 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:35.292686 [FINER] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Writing 50 bytes: 00309e9203e69768e8efa0f0e51026ec12ecfe430bd2d9ba904b2a0e2841a9e7f736512c4562b39e8f6820828bb05bfd0370
2026-02-02T15:35:35.292686 [FINEST] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Flushed 50 bytes successfully. Data preview (hex): 00309e9203e69768e8efa0f0e51026ec12ecfe43...
2026-02-02T15:35:35.292686 [FINE] [YamuxStream] [6][Server] StreamID=1 Direct write: Successfully wrote all 20 bytes in 1ms
2026-02-02T15:35:35.292686 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:35.292686 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:35.292686 [FINEST] [YamuxStream] [6][Server] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:35.294192 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.294192 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.294192 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.294192 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.294192 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.294192 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.294192 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.294192 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.294192 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.294192 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(3c7afbc8) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.294192 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(3c7afbc8) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.294192 [FINEST] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 00309e9203e69768e8efa0f0e51026ec12ecfe430bd2d9ba904b2a0e2841a9e7f736512c4562b39e8f6820828bb05bfd0370
2026-02-02T15:35:35.295211 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(8f831fc6) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.295211 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(8f831fc6) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 9e9203e69768e8efa0f0e51026ec12ecfe430bd2d9ba904b2a0e2841a9e7f736512c4562b39e8f6820828bb05bfd0370
2026-02-02T15:35:35.296210 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:35.296210 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.296210 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:35.296210 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:35.296210 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:35.296210 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:35.296210 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:35.296210 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(4a4c1f90) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:35.296210 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(4a4c1f90) END (from buffer). Returning 48 bytes: 9e9203e69768e8efa0f0e51026ec12ecfe430bd2d9ba904b2a0e2841a9e7f736512c4562b39e8f6820828bb05bfd0370. Buffer after: 0 bytes: 
2026-02-02T15:35:35.296210 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [158, 146, 3, 230]
2026-02-02T15:35:35.296210 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:35.296210 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 9e9203e69768e8efa0f0e51026ec12ecfe430bd2d9ba904b2a0e2841a9e7f736512c4562b39e8f6820828bb05bfd0370
2026-02-02T15:35:35.296210 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:35.296210 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:35.296210 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 9e9203e69768e8efa0f0e51026ec12ecfe430bd2d9ba904b2a0e2841a9e7f736
2026-02-02T15:35:35.296210 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 512c4562b39e8f6820828bb05bfd0370
2026-02-02T15:35:35.296210 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [158, 146, 3, 230]
2026-02-02T15:35:35.296210 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [81, 44, 69, 98]
2026-02-02T15:35:35.296210 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [81, 44, 69, 98, 179, 158, 143, 104, 32, 130, 139, 176, 91, 253, 3, 112]
2026-02-02T15:35:35.296210 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=4 ([0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.296210 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059908332): [196, 111, 39, 56, 13, 151, 79, 154, 112, 223, 4, 202, 83, 225, 2, 137, 100, 5, 79, 36, 20, 48, 160, 93, 8, 107, 75, 219, 116, 80, 189, 210]
2026-02-02T15:35:35.297715 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=4, got 32 bytes
2026-02-02T15:35:35.297715 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:35.297715 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 20]
2026-02-02T15:35:35.297715 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.297715 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.297715 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:35.297715 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.297715 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.297715 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.297715 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:35.297715 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:35.297715 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:35.297715 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:35.297715 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.298730 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:35.298730 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:35.298730 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:35.298730 [FINE] [YamuxStream] [7][Client] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:35:35.298730 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:35:35.298730 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:35:35.298730 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:35:35.298730 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:35:35.298730 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 46 bytes: 002c49e0e7ddc482ffc4ae817a95b124c7f0b7ccae0c1dc78380bdb12ec09e2410ccf22d8cd161cd5d66c87a491b
2026-02-02T15:35:35.299729 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 46 bytes successfully. Data preview (hex): 002c49e0e7ddc482ffc4ae817a95b124c7f0b7cc...
2026-02-02T15:35:35.299729 [FINE] [YamuxStream] [7][Client] StreamID=1 Direct write: Successfully wrote all 16 bytes in 0ms
2026-02-02T15:35:35.299729 [FINEST] [YamuxStream] [7][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:35.299729 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.299729 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.299729 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.299729 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.299729 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.299729 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.299729 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.299729 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.299729 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.300729 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(7c5d16e1) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.300729 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(7c5d16e1) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.300729 [FINEST] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002c49e0e7ddc482ffc4ae817a95b124c7f0b7ccae0c1dc78380bdb12ec09e2410ccf22d8cd161cd5d66c87a491b
2026-02-02T15:35:35.300729 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(3c7afbc8) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.300729 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(3c7afbc8) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: 49e0e7ddc482ffc4ae817a95b124c7f0b7ccae0c1dc78380bdb12ec09e2410ccf22d8cd161cd5d66c87a491b
2026-02-02T15:35:35.300729 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:35:35.300729 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.300729 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:35:35.300729 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:35:35.300729 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:35:35.300729 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:35:35.300729 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:35:35.300729 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(07f396ab) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:35:35.300729 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(07f396ab) END (from buffer). Returning 44 bytes: 49e0e7ddc482ffc4ae817a95b124c7f0b7ccae0c1dc78380bdb12ec09e2410ccf22d8cd161cd5d66c87a491b. Buffer after: 0 bytes: 
2026-02-02T15:35:35.301729 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [73, 224, 231, 221]
2026-02-02T15:35:35.301729 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:35:35.301729 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: 49e0e7ddc482ffc4ae817a95b124c7f0b7ccae0c1dc78380bdb12ec09e2410ccf22d8cd161cd5d66c87a491b
2026-02-02T15:35:35.301729 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:35:35.301729 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:35:35.301729 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 49e0e7ddc482ffc4ae817a95b124c7f0b7ccae0c1dc78380bdb12ec0
2026-02-02T15:35:35.301729 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 9e2410ccf22d8cd161cd5d66c87a491b
2026-02-02T15:35:35.301729 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [73, 224, 231, 221]
2026-02-02T15:35:35.301729 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [158, 36, 16, 204]
2026-02-02T15:35:35.302233 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [158, 36, 16, 204, 242, 45, 140, 209, 97, 205, 93, 102, 200, 122, 73, 27]
2026-02-02T15:35:35.302233 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.302233 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065187257): [95, 246, 1, 216, 135, 227, 242, 112, 202, 241, 214, 253, 22, 206, 190, 195, 119, 150, 255, 228, 62, 54, 71, 23, 22, 221, 221, 41, 56, 34, 192, 64]
2026-02-02T15:35:35.302233 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:35:35.302233 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:35:35.302233 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:35:35.302233 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.302233 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.302233 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:35:35.302233 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.302233 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.302233 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.302233 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:35:35.303237 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:35:35.303237 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:35.303237 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:35:35.303237 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.303237 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:35:35.303237 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:35:35.303237 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:35:35.303237 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/ipfs/id/1.0.0"
2026-02-02T15:35:35.303237 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/ipfs/id/1.0.0"
2026-02-02T15:35:35.304239 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/ipfs/id/1.0.0". Sending acknowledgment: "/ipfs/id/1.0.0".
2026-02-02T15:35:35.304239 [FINE] [YamuxStream] [6][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 16 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:35:35.304239 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 28, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16, 15, 47, 105, 112, 102, 115, 47, 105])
2026-02-02T15:35:35.304239 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=5
2026-02-02T15:35:35.304914 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 44 bytes (plaintext was 28)
2026-02-02T15:35:35.304914 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 46
2026-02-02T15:35:35.304914 [FINER] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Writing 46 bytes: 002c15eab46b46dc81ec352509ed2fa9947cbde5e189b5dfc86b43c711a4de7b1f3f3ebca87baca14f815efc5946
2026-02-02T15:35:35.304914 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.304914 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.304914 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.304914 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.305729 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.305729 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.305729 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.305729 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.305729 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.305729 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(c3e4543d) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.305729 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(c3e4543d) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.305729 [FINEST] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - RAW_SOCKET_DATA_CHUNK_RECV (46 bytes): 002c15eab46b46dc81ec352509ed2fa9947cbde5e189b5dfc86b43c711a4de7b1f3f3ebca87baca14f815efc5946
2026-02-02T15:35:35.305729 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(7c5d16e1) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.305729 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(7c5d16e1) END (from buffer). Returning 2 bytes: 002c. Buffer after: 44 bytes: 15eab46b46dc81ec352509ed2fa9947cbde5e189b5dfc86b43c711a4de7b1f3f3ebca87baca14f815efc5946
2026-02-02T15:35:35.305729 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 44]
2026-02-02T15:35:35.305729 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.305729 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 44]
2026-02-02T15:35:35.305729 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 002c
2026-02-02T15:35:35.305729 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 44
2026-02-02T15:35:35.306733 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 44
2026-02-02T15:35:35.306733 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 44 more bytes (have 0/44)
2026-02-02T15:35:35.306733 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(c015b371) START. Requested: 44. Buffer: 44 bytes.
2026-02-02T15:35:35.306733 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(c015b371) END (from buffer). Returning 44 bytes: 15eab46b46dc81ec352509ed2fa9947cbde5e189b5dfc86b43c711a4de7b1f3f3ebca87baca14f815efc5946. Buffer after: 0 bytes: 
2026-02-02T15:35:35.306733 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 44 bytes. First 4 bytes: [21, 234, 180, 107]
2026-02-02T15:35:35.306733 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 44, Got: 44
2026-02-02T15:35:35.306733 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 44, Bytes: 15eab46b46dc81ec352509ed2fa9947cbde5e189b5dfc86b43c711a4de7b1f3f3ebca87baca14f815efc5946
2026-02-02T15:35:35.306733 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 44
2026-02-02T15:35:35.306733 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(28) and MAC(16)
2026-02-02T15:35:35.306733 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 15eab46b46dc81ec352509ed2fa9947cbde5e189b5dfc86b43c711a4
2026-02-02T15:35:35.306733 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: de7b1f3f3ebca87baca14f815efc5946
2026-02-02T15:35:35.306733 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [21, 234, 180, 107]
2026-02-02T15:35:35.306733 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [222, 123, 31, 63]
2026-02-02T15:35:35.306733 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [222, 123, 31, 63, 62, 188, 168, 123, 172, 161, 79, 129, 94, 252, 89, 70]
2026-02-02T15:35:35.306733 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=5 ([0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.306733 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059908332): [196, 111, 39, 56, 13, 151, 79, 154, 112, 223, 4, 202, 83, 225, 2, 137, 100, 5, 79, 36, 20, 48, 160, 93, 8, 107, 75, 219, 116, 80, 189, 210]
2026-02-02T15:35:35.307738 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=5, got 28 bytes
2026-02-02T15:35:35.307738 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 28 bytes to _decryptedBuffer. New _decryptedBuffer.length: 28
2026-02-02T15:35:35.307738 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 16. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 16]
2026-02-02T15:35:35.307738 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.307738 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.307738 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=16
2026-02-02T15:35:35.307738 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.307738 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.307738 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.307738 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=16
2026-02-02T15:35:35.307738 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 16, _decryptedBuffer.length: 16
2026-02-02T15:35:35.307738 [FINER] [SecuredConnection] SecuredConnection.read (length=16): Returning 16 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [15, 47, 105, 112, 102, 115, 47, 105, 100, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:35.307738 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=16
2026-02-02T15:35:35.307738 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.308892 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 16, flags: 0
2026-02-02T15:35:35.308892 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 16 bytes directly to waiting reader
2026-02-02T15:35:35.308892 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 36
2026-02-02T15:35:35.308892 [FINE] [YamuxStream] [7][Client] StreamID=1 setDeadline() set to 2026-02-02T15:36:05.308892
2026-02-02T15:35:35.308892 [FINE] [StreamScopeImpl] stream-1770068135278-3708: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.308892 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
2026-02-02T15:35:35.308892 [FINE] [StreamScopeImpl] stream-1770068135278-3708: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:35.309892 [FINE] [identify]  [IDENTIFY-STREAM-READY] peer=12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS, stream_id=1, protocol=/ipfs/id/1.0.0
2026-02-02T15:35:35.309892 [FINE] [StreamScopeImpl] stream-1770068135278-3708: Setting service to libp2p.identify for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS, protocol /ipfs/id/1.0.0
2026-02-02T15:35:35.309892 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
2026-02-02T15:35:35.309892 [FINE] [StreamScopeImpl] stream-1770068135278-3708: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:35:35.309892 [FINEST] [YamuxStream] [7][Client] StreamID=1 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:35.311891 [FINEST] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Flushed 46 bytes successfully. Data preview (hex): 002c15eab46b46dc81ec352509ed2fa9947cbde5...
2026-02-02T15:35:35.311891 [FINE] [YamuxStream] [6][Server] StreamID=1 Direct write: Successfully wrote all 16 bytes in 7ms
2026-02-02T15:35:35.311891 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/ipfs/id/1.0.0".
2026-02-02T15:35:35.311891 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/ipfs/id/1.0.0" and its handler.
2026-02-02T15:35:35.311891 [FINE] [multistream] [multistreamMuxer - handle] Protocol /ipfs/id/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:35.311891 [FINE] [StreamScopeImpl] stream-1770068135271-3260: Setting protocol to /ipfs/id/1.0.0 for peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:35.311891 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/id/1.0.0
2026-02-02T15:35:35.311891 [FINE] [StreamScopeImpl] stream-1770068135271-3260: Successfully set protocol to /ipfs/id/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:35.311891 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /ipfs/id/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:35:35.311891 [FINE] [identify] IdentifyService.handleIdentifyRequest: SERVER received identify request from 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL (reported as 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL) on stream 1
2026-02-02T15:35:35.313395 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER ENTRY POINT for peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL. IsPush: false. Stream ID: 1
2026-02-02T15:35:35.313395 [FINE] [identify] IdentifyService.sendIdentifyResp: Preparing to send identify response to 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL. IsPush: false. Stream ID: 1
2026-02-02T15:35:35.313395 [FINER] [identify] IdentifyService.sendIdentifyResp: Setting service scope for stream to 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL.
2026-02-02T15:35:35.313395 [FINE] [StreamScopeImpl] stream-1770068135271-3260: Setting service to libp2p.identify for peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL, protocol /ipfs/id/1.0.0
2026-02-02T15:35:35.313395 [FINE] [ResourceManagerImpl] Creating new service scope: libp2p.identify
2026-02-02T15:35:35.313395 [FINE] [StreamScopeImpl] stream-1770068135271-3260: Successfully set service to libp2p.identify. Edges updated.
2026-02-02T15:35:35.313395 [FINER] [identify] IdentifyService.sendIdentifyResp: Acquiring current snapshot for 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL.
2026-02-02T15:35:35.313395 [FINE] [identify] IdentifyService.sendIdentifyResp: Sending snapshot to 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL: seq=4, protocols=7, addrs=2
2026-02-02T15:35:35.314431 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Creating base response for peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL. Snapshot seq: 4
2026-02-02T15:35:35.315453 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ObservedAddr set to /ip4/127.0.0.1/tcp/58653 for 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:35.315453 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: LocalAddr: /ip4/0.0.0.0/tcp/4702, RemoteAddr: /ip4/127.0.0.1/tcp/58653, ViaLoopback: true for 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:35.315453 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added 2 listen addresses for 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:35.315453 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: Added public key (36 bytes) for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.316466 [FINER] [identify] IdentifyService._createBaseIdentifyResponse: ProtocolVersion: ipfs/0.1.0, AgentVersion: dart-libp2p/0.1.0 for 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:35.316466 [FINER] [identify] IdentifyService._getSignedRecord: Attempting to get signed record. DisableSignedPeerRecord: false, Snapshot record type: Future<Envelope?>
2026-02-02T15:35:35.316466 [FINER] [identify] IdentifyService._getSignedRecord: Marshalled signed record successfully (181 bytes).
2026-02-02T15:35:35.316466 [FINER] [identify] IdentifyService.sendIdentifyResp: Added signed peer record (181 bytes) to response for 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL.
2026-02-02T15:35:35.316466 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER About to write identify message to 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL on stream 1 (remote addr: /ip4/127.0.0.1/tcp/58653)
2026-02-02T15:35:35.316466 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Writing to stream 1 for peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL. Total message size: 427 bytes. SignedPeerRecord present: true
2026-02-02T15:35:35.316466 [FINER] [identify] IdentifyService._writeChunkedIdentifyMsg: Sending as single delimited message (size 427).
2026-02-02T15:35:35.317465 [FINE] [YamuxStream] [6][Server] StreamID=1 YamuxStream.write: ENTERED. Requested to write 429 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524252
2026-02-02T15:35:35.317465 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 441, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 173, 171, 3, 10, 36, 8, 1, 18, 32])
2026-02-02T15:35:35.317465 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:35:35.317465 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 457 bytes (plaintext was 441)
2026-02-02T15:35:35.317465 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 459
2026-02-02T15:35:35.317465 [FINER] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Writing 459 bytes: 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
2026-02-02T15:35:35.320465 [FINEST] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Flushed 459 bytes successfully. Data preview (hex): 01c970f5ffab01f7632bfe9f8898aea3b3fad3af...
2026-02-02T15:35:35.320465 [FINE] [YamuxStream] [6][Server] StreamID=1 Direct write: Successfully wrote all 429 bytes in 3ms
2026-02-02T15:35:35.320465 [FINE] [identify] IdentifyService._writeChunkedIdentifyMsg: Single message sent to 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL.
2026-02-02T15:35:35.320465 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Identify message written to 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL.
2026-02-02T15:35:35.321464 [FINER] [identify] IdentifyService.sendIdentifyResp: Updating sequence number for connection to 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL.
2026-02-02T15:35:35.321464 [FINER] [identify] IdentifyService.sendIdentifyResp: Updated sequence for 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL to 4.
2026-02-02T15:35:35.321464 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER Signalling end of writes (calling stream.closeWrite()) on stream to 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL.
2026-02-02T15:35:35.321464 [FINER] [YamuxStream] [6][Server] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:35:35.321464 [FINER] [YamuxStream] [6][Server] StreamID=1 Sending FIN frame for closeWrite().
2026-02-02T15:35:35.321464 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:35.321464 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:35:35.321464 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:35.321464 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:35.322468 [FINER] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Writing 30 bytes: 001c7d5b46cb03170e46f063fb5ef63ce6a712e2663287bff2e234ebb1d2
2026-02-02T15:35:35.322468 [FINEST] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Flushed 30 bytes successfully. Data preview (hex): 001c7d5b46cb03170e46f063fb5ef63ce6a712e2...
2026-02-02T15:35:35.322468 [FINE] [YamuxStream] [6][Server] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:35:35.322468 [FINE] [YamuxStream] [6][Server] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:35:35.322468 [FINE] [identify] IdentifyService.sendIdentifyResp: SERVER stream.closeWrite() completed for 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL. Stream will NOT be fully closed by sendIdentifyResp anymore.
2026-02-02T15:35:35.322468 [FINE] [identify] IdentifyService.sendIdentifyResp: Successfully sent identify response and signalled closeWrite to 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL. IsPush: false.
2026-02-02T15:35:35.323469 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.323469 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.323469 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.323469 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.323469 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.323469 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.323469 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.323469 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.323469 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.323469 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(32a4441e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.323469 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(32a4441e) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.323469 [FINEST] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - RAW_SOCKET_DATA_CHUNK_RECV (459 bytes): 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
2026-02-02T15:35:35.323469 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(32a4441e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.324467 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(32a4441e) END (from buffer). Returning 2 bytes: 01c9. Buffer after: 457 bytes: 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
2026-02-02T15:35:35.324467 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [1, 201]
2026-02-02T15:35:35.324467 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.324467 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [1, 201]
2026-02-02T15:35:35.324467 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 01c9
2026-02-02T15:35:35.324467 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 457
2026-02-02T15:35:35.324467 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 457
2026-02-02T15:35:35.324467 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 457 more bytes (have 0/457)
2026-02-02T15:35:35.324467 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(b36c968f) START. Requested: 457. Buffer: 457 bytes.
2026-02-02T15:35:35.324467 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(b36c968f) END (from buffer). Returning 457 bytes: 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. Buffer after: 0 bytes: 
2026-02-02T15:35:35.324467 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 457 bytes. First 4 bytes: [112, 245, 255, 171]
2026-02-02T15:35:35.324467 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 457, Got: 457
2026-02-02T15:35:35.324467 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 457, Bytes: 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
2026-02-02T15:35:35.324467 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 457
2026-02-02T15:35:35.324467 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(441) and MAC(16)
2026-02-02T15:35:35.324467 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 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
2026-02-02T15:35:35.324467 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2af2dcff0c052e85c0b841d3148ddad7
2026-02-02T15:35:35.324467 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [112, 245, 255, 171]
2026-02-02T15:35:35.324467 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [42, 242, 220, 255]
2026-02-02T15:35:35.324467 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [42, 242, 220, 255, 12, 5, 46, 133, 192, 184, 65, 211, 20, 141, 218, 215]
2026-02-02T15:35:35.324467 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.324467 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059908332): [196, 111, 39, 56, 13, 151, 79, 154, 112, 223, 4, 202, 83, 225, 2, 137, 100, 5, 79, 36, 20, 48, 160, 93, 8, 107, 75, 219, 116, 80, 189, 210]
2026-02-02T15:35:35.326493 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 441 bytes
2026-02-02T15:35:35.326493 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 441 bytes to _decryptedBuffer. New _decryptedBuffer.length: 441
2026-02-02T15:35:35.326493 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 429. Data preview: [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 173]
2026-02-02T15:35:35.326493 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.326493 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.326493 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=429
2026-02-02T15:35:35.326493 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.326493 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.326493 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.326493 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=429
2026-02-02T15:35:35.326493 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 429, _decryptedBuffer.length: 429
2026-02-02T15:35:35.326493 [FINER] [SecuredConnection] SecuredConnection.read (length=429): Returning 429 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [171, 3, 10, 36, 8, 1, 18, 32, 101, 246, 188, 139, 179, 6, 118, 216, 128, 195, 147, 233]
2026-02-02T15:35:35.326493 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=429
2026-02-02T15:35:35.327528 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.327528 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 429, flags: 0
2026-02-02T15:35:35.327528 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 429 bytes directly to waiting reader
2026-02-02T15:35:35.327528 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 465
2026-02-02T15:35:35.327528 [FINE] [identify]  [READ-ALL-ID-MESSAGES] Parsed identify from peer=12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS, 427 bytes, duration=17ms
2026-02-02T15:35:35.327528 [FINE] [identify] IdentifyService._consumeMessage: Consuming identify message from 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS. IsPush: false.
2026-02-02T15:35:35.327528 [FINER] [identify] IdentifyService._consumeMessage: Current known protocols for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS: 0
2026-02-02T15:35:35.328529 [FINER] [identify] IdentifyService._consumeMessage: Received protocols from 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS: 7
2026-02-02T15:35:35.328529 [FINER] [identify] IdentifyService._diff: Calculating protocol diff. Before: 0, After: 7
2026-02-02T15:35:35.328529 [FINER] [identify] IdentifyService._diff: Added: 7, Removed: 0
2026-02-02T15:35:35.328529 [FINE] [identify] IdentifyService._consumeMessage: For peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS - Added protocols: 7, Removed protocols: 0
2026-02-02T15:35:35.328529 [FINE] [identify] IdentifyService._consumeMessage: Parsed observed address for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS: /ip4/127.0.0.1/tcp/58653
2026-02-02T15:35:35.328529 [FINE] [identify] IdentifyService._consumeMessage: Recording observed address /ip4/127.0.0.1/tcp/58653 for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS via conn 0.
2026-02-02T15:35:35.328529 [FINER] [identify] IdentifyService._consumeMessage: Processing 2 listen addresses from 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:35.329527 [FINE] [identify] IdentifyService._consumeMessage: Parsed 2 listen addresses for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:35.329527 [FINER] [identify] IdentifyService._consumeMessage: Attempting to parse signed peer record for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS (181 bytes).
2026-02-02T15:35:35.329527 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Checking for signed peer record.
2026-02-02T15:35:35.329527 [FINER] [identify] IdentifyService.signedPeerRecordFromMessage: Attempting to consume envelope from 181 bytes.
01:06 +925 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +925 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:35.337761 [FINE] [identify] IdentifyService.signedPeerRecordFromMessage: Successfully consumed envelope.
2026-02-02T15:35:35.337761 [FINE] [identify] IdentifyService._consumeMessage: Parsed signed peer record for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS: true
2026-02-02T15:35:35.337761 [FINER] [identify] IdentifyService._consumeMessage: Connectedness for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS: Connectedness.connected. Default TTL: 4:00:00.000000
2026-02-02T15:35:35.337761 [FINER] [identify] IdentifyService._consumeMessage: Peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS is connected/limited, using TTL: 875976:00:00.000000
2026-02-02T15:35:35.337761 [FINER] [identify] IdentifyService._consumeMessage: Updating address book for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS. Current TTLs: RecentlyConnectedAddrTTL=4:00:00.000000, ConnectedAddrTTL=875976:00:00.000000, TempAddrTTL=0:02:00.000000.
2026-02-02T15:35:35.337761 [FINER] [identify] IdentifyService._consumeMessage: Consuming signed peer record for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:35.338777 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Consuming signed record for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:35.338777 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Derived PeerId 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS from record public key for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:35.338777 [FINER] [identify] IdentifyService._consumeSignedPeerRecord: Obtained record from envelope for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:35.338777 [FINE] [identify] IdentifyService._consumeSignedPeerRecord: Successfully consumed signed peer record for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS. Found 2 addresses.
2026-02-02T15:35:35.338777 [FINE] [identify] IdentifyService._consumeMessage: Addresses from signed peer record for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS: 2
2026-02-02T15:35:35.338777 [FINER] [identify] IdentifyService._consumeMessage: Filtering addresses for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS based on remote connection address /ip4/127.0.0.1/tcp/4702. Before filter: 2
2026-02-02T15:35:35.338777 [FINER] [identify] IdentifyService._filterAddrs: Filtering 2 addresses based on remote address type: /ip4/127.0.0.1/tcp/4702 (Loopback: true, Private: false, Public: false)
2026-02-02T15:35:35.338777 [FINER] [identify] IdentifyService._filterAddrs: Remote is loopback, returning all addresses.
2026-02-02T15:35:35.338777 [FINER] [identify] IdentifyService._consumeMessage: After filter for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS: 2
2026-02-02T15:35:35.339777 [FINE] [identify] IdentifyService._consumeMessage: Adding 2 addresses for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS to peerstore with TTL 875976:00:00.000000.
2026-02-02T15:35:35.339777 [FINER] [identify] IdentifyService._consumeMessage: Updating TempAddrTTL to zero for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:35.340285 [FINE] [identify] IdentifyService._consumeMessage: Storing metadata for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS: ProtocolVersion=ipfs/0.1.0, AgentVersion=dart-libp2p/0.1.0
2026-02-02T15:35:35.340285 [FINER] [identify] IdentifyService._consumeMessage: Consuming received public key for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:35.340285 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Consuming public key for remote peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS from local peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL.
2026-02-02T15:35:35.340285 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Received 36 bytes for public key of 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:35.340789 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Successfully unmarshalled public key for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:35.340789 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS from received public key for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:35.340789 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Derived PeerId 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS matches expected remote peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:35.340789 [FINER] [identify] IdentifyService._consumeReceivedPubKey: Existing public key found for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS. Comparing with received key.
2026-02-02T15:35:35.340789 [FINE] [identify] IdentifyService._consumeReceivedPubKey: Received public key for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS matches existing key in peerstore.
2026-02-02T15:35:35.340789 [FINE] [identify] IdentifyService._consumeMessage: Finished consuming message from 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:35.340789 [FINER] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Checking push support for 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS in peerstore.
2026-02-02T15:35:35.340789 [FINE] [autonatv2] Peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS identification completed, updating peer map
2026-02-02T15:35:35.341792 [FINE] [identify] IdentifyService.handleIdentifyResponse (CLIENT): Peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS supports push.
2026-02-02T15:35:35.341792 [FINER] [YamuxStream] [7][Client] StreamID=1 closeWrite() called. Current state: YamuxStreamState.open
2026-02-02T15:35:35.342296 [FINER] [YamuxStream] [7][Client] StreamID=1 Sending FIN frame for closeWrite().
01:06 +926 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +926 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:35.342296 [FINE] [autonatv2] Updating peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS: protocols=[/ipfs/1.0.0, /ipfs/id/1.0.0, /ipfs/id/push/1.0.0, /ipfs/ping/1.0.0, /libp2p/autonat/2/dial-back, /libp2p/autonat/2/dial-request, /libp2p/dcutr], connectedness=Connectedness.connected
2026-02-02T15:35:35.342296 [FINE] [autonatv2] Adding peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS to AutoNAT v2 peer map (supports /libp2p/autonat/2/dial-request)
2026-02-02T15:35:35.342801 [FINE] [ambient_autonat_v2] Peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS supports AutoNAT v2, scheduling probe
2026-02-02T15:35:35.342801 [FINE] [ambient_autonat_v2] Scheduling probe in 2s (force: true, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:35.342801 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0])
2026-02-02T15:35:35.342801 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=6
2026-02-02T15:35:35.343318 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:35.343318 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:35.343318 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 30 bytes: 001c753ad494ae33f5922e133d9e9a238655d6651a3b940923e2c42f9d02
2026-02-02T15:35:35.343839 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 30 bytes successfully. Data preview (hex): 001c753ad494ae33f5922e133d9e9a238655d665...
2026-02-02T15:35:35.343839 [FINE] [YamuxStream] [7][Client] StreamID=1 closeWrite() sent FIN and set _localFinSent=true. Current stream state: YamuxStreamState.open.
2026-02-02T15:35:35.343839 [FINE] [YamuxStream] [7][Client] StreamID=1 closeWrite() completed. Stream remains readable in state: YamuxStreamState.open.
2026-02-02T15:35:35.343839 [FINE] [identify]  [SPAWN-IDENTIFY-SUCCESS] Identify succeeded for peer=12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS, duration=79ms
2026-02-02T15:35:35.343839 [FINE] [Libp2pRouter] [DEBUG] Connected to peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.343839 [FINEST] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c7d5b46cb03170e46f063fb5ef63ce6a712e2663287bff2e234ebb1d2
2026-02-02T15:35:35.343839 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.343839 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.343839 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.343839 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.344845 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.344845 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.344845 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.344845 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.344845 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.344845 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(77deabd0) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:35.344845 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(77deabd0) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 7d5b46cb03170e46f063fb5ef63ce6a712e2663287bff2e234ebb1d2
2026-02-02T15:35:35.344845 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:35.344845 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.344845 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:35.344845 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:35.344845 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:35.344845 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:35.344845 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:35.344845 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(4e4c184c) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:35.344845 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(4e4c184c) END (from buffer). Returning 28 bytes: 7d5b46cb03170e46f063fb5ef63ce6a712e2663287bff2e234ebb1d2. Buffer after: 0 bytes: 
2026-02-02T15:35:35.345863 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [125, 91, 70, 203]
2026-02-02T15:35:35.345863 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:35.345863 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 7d5b46cb03170e46f063fb5ef63ce6a712e2663287bff2e234ebb1d2
2026-02-02T15:35:35.345863 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:35.345863 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:35.345863 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 7d5b46cb03170e46f063fb5e
2026-02-02T15:35:35.345863 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: f63ce6a712e2663287bff2e234ebb1d2
2026-02-02T15:35:35.345863 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [125, 91, 70, 203]
2026-02-02T15:35:35.345863 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [246, 60, 230, 167]
2026-02-02T15:35:35.345863 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [246, 60, 230, 167, 18, 226, 102, 50, 135, 191, 242, 226, 52, 235, 177, 210]
2026-02-02T15:35:35.345863 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.345863 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059908332): [196, 111, 39, 56, 13, 151, 79, 154, 112, 223, 4, 202, 83, 225, 2, 137, 100, 5, 79, 36, 20, 48, 160, 93, 8, 107, 75, 219, 116, 80, 189, 210]
2026-02-02T15:35:35.345863 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:35:35.345863 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:35.345863 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:35.345863 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.347368 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.347368 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:35.347368 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:35:35.347368 [FINE] [YamuxStream] [7][Client] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:35:35.347368 [FINEST] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c753ad494ae33f5922e133d9e9a238655d6651a3b940923e2c42f9d02
2026-02-02T15:35:35.347368 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(c3e4543d) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.347368 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(c3e4543d) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 753ad494ae33f5922e133d9e9a238655d6651a3b940923e2c42f9d02
2026-02-02T15:35:35.347368 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:35.347368 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.347368 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:35.347368 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:35.347368 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:35.347368 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:35.348467 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:35.348467 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(e0b0dd35) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:35.348467 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(e0b0dd35) END (from buffer). Returning 28 bytes: 753ad494ae33f5922e133d9e9a238655d6651a3b940923e2c42f9d02. Buffer after: 0 bytes: 
2026-02-02T15:35:35.348467 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [117, 58, 212, 148]
2026-02-02T15:35:35.348467 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:35.348467 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 753ad494ae33f5922e133d9e9a238655d6651a3b940923e2c42f9d02
2026-02-02T15:35:35.348467 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:35.348467 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:35.348467 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 753ad494ae33f5922e133d9e
2026-02-02T15:35:35.348467 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 9a238655d6651a3b940923e2c42f9d02
2026-02-02T15:35:35.348467 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [117, 58, 212, 148]
2026-02-02T15:35:35.348467 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [154, 35, 134, 85]
2026-02-02T15:35:35.349465 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [154, 35, 134, 85, 214, 101, 26, 59, 148, 9, 35, 226, 196, 47, 157, 2]
2026-02-02T15:35:35.349465 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=6 ([0, 0, 0, 0, 6, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.349465 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065187257): [95, 246, 1, 216, 135, 227, 242, 112, 202, 241, 214, 253, 22, 206, 190, 195, 119, 150, 255, 228, 62, 54, 71, 23, 22, 221, 221, 41, 56, 34, 192, 64]
01:06 +927 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +927 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:35.349465 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=6, got 12 bytes
2026-02-02T15:35:35.349465 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:35.349465 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 1, 0, 0, 0, 0]
2026-02-02T15:35:35.349465 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.349465 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.349465 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:35.349465 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:35:35.349465 [FINE] [YamuxStream] [6][Server] StreamID=1 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=true, queueSize=0
2026-02-02T15:35:35.349465 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.349465 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.349465 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.349465 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.349465 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.349465 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.350969 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.350969 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.350969 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.350969 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(941685aa) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.350969 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(941685aa) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.350969 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.350969 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.350969 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.350969 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.350969 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.350969 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.350969 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.350969 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.350969 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.350969 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(12911f19) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.350969 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(12911f19) ASYNC WAIT. Requested: 2. Buffer: 0
01:06 +928 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +929 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +930 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +931 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +932 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +933 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +934 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +935 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +936 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +937 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +938 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage sendMessage should handle large messages
01:06 +938 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:35.858122 [FINE] [Libp2pRouter] [VERBOSE] Sending message to 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS via protocol /ipfs/1.0.0
2026-02-02T15:35:35.858122 [WARNING] [basichost] 🎯 [newStream] ENTERED for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS, protocols: [/ipfs/1.0.0]
2026-02-02T15:35:35.859125 [WARNING] [basichost] 🎯 [newStream Phase 1] Connecting to peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS...
2026-02-02T15:35:35.859125 [WARNING] [basichost] ✅ [newStream Phase 1] Connected to peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.859125 [WARNING] [basichost] 🎯 [newStream Phase 2] Creating stream to peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS...
2026-02-02T15:35:35.859125 [WARNING] [Swarm] Swarm.newStream: Entered for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS. Context HashCode: 169134303
2026-02-02T15:35:35.860124 [WARNING] [Swarm] Swarm.newStream: Swarm is open for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS.
2026-02-02T15:35:35.860124 [WARNING] [Swarm] Swarm.newStream: Calling dialPeer(context, 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS).
2026-02-02T15:35:35.860124 [FINE] [Swarm] Swarm.dialPeer: peer=12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS, existing_conns=1
2026-02-02T15:35:35.860124 [FINE] [Swarm] Looking up connections for peer ID string: "12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS"
2026-02-02T15:35:35.860124 [FINE] [Swarm] Found 1 existing connections for peer ID string: "12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS"
2026-02-02T15:35:35.860124 [FINE] [Swarm] Swarm.dialPeer: Found 1 existing connection(s) for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS. Validating health...
2026-02-02T15:35:35.861125 [WARNING] [Swarm] Swarm.dialPeer: Found healthy connection for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS. Returning newest connection ID: 0
2026-02-02T15:35:35.861125 [WARNING] [Swarm] Swarm.newStream: Successfully dialed peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS. Conn runtimeType: SwarmConn, Conn ID: 0, Conn local: 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL, Conn remote: 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.861125 [WARNING] [Swarm] Swarm.newStream: About to call (conn as SwarmConn).newStream() for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS on SwarmConn 0.
2026-02-02T15:35:35.861125 [FINE] [SwarmConn] SwarmConn.newStream (0): Entered to peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS. Context HashCode: 169134303
2026-02-02T15:35:35.861125 [FINE] [SwarmConn] SwarmConn.newStream (0): Connection is open.
2026-02-02T15:35:35.861125 [FINE] [SwarmConn] SwarmConn.newStream (0): Type of this.conn (the UpgradedConnectionImpl): UpgradedConnectionImpl
2026-02-02T15:35:35.861125 [FINE] [SwarmConn] SwarmConn.newStream (0): About to call this.conn.newStream(context). This will call UpgradedConnectionImpl.newStream.
2026-02-02T15:35:35.861125 [FINE] [YamuxStream] [7][Client] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:35.863124 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:35:35.863124 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=7
2026-02-02T15:35:35.863124 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:35.863124 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:35.863124 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 30 bytes: 001cef7348c7b808b8d76d79ee373da73f9caa9bad8624d5706ba43d7737
2026-02-02T15:35:35.863124 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 30 bytes successfully. Data preview (hex): 001cef7348c7b808b8d76d79ee373da73f9caa9b...
2026-02-02T15:35:35.864124 [FINEST] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001cef7348c7b808b8d76d79ee373da73f9caa9bad8624d5706ba43d7737
2026-02-02T15:35:35.864124 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(12911f19) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.864124 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(12911f19) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: ef7348c7b808b8d76d79ee373da73f9caa9bad8624d5706ba43d7737
2026-02-02T15:35:35.864124 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:35.864124 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.864124 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:35.864124 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:35.864124 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:35.864124 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:35.864124 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:35.864124 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(02158a9f) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:35.864124 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(02158a9f) END (from buffer). Returning 28 bytes: ef7348c7b808b8d76d79ee373da73f9caa9bad8624d5706ba43d7737. Buffer after: 0 bytes: 
2026-02-02T15:35:35.865124 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [239, 115, 72, 199]
2026-02-02T15:35:35.865124 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:35.865124 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: ef7348c7b808b8d76d79ee373da73f9caa9bad8624d5706ba43d7737
2026-02-02T15:35:35.865124 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:35.865124 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:35.865124 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: ef7348c7b808b8d76d79ee37
2026-02-02T15:35:35.865124 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 3da73f9caa9bad8624d5706ba43d7737
2026-02-02T15:35:35.865124 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [239, 115, 72, 199]
2026-02-02T15:35:35.865124 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [61, 167, 63, 156]
2026-02-02T15:35:35.865124 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [61, 167, 63, 156, 170, 155, 173, 134, 36, 213, 112, 107, 164, 61, 119, 55]
2026-02-02T15:35:35.865124 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=7 ([0, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.865124 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065187257): [95, 246, 1, 216, 135, 227, 242, 112, 202, 241, 214, 253, 22, 206, 190, 195, 119, 150, 255, 228, 62, 54, 71, 23, 22, 221, 221, 41, 56, 34, 192, 64]
2026-02-02T15:35:35.866122 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=7, got 12 bytes
2026-02-02T15:35:35.866122 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:35.866122 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:35:35.866122 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.867122 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.867122 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:35:35.867122 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:35:35.867122 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:35.867122 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:35.867122 [FINER] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Writing 30 bytes: 001c305d602121312cc46a75c700352a360a587e448ac4c66738d92a53c3
2026-02-02T15:35:35.867122 [FINEST] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Flushed 30 bytes successfully. Data preview (hex): 001c305d602121312cc46a75c700352a360a587e...
2026-02-02T15:35:35.868126 [FINE] [YamuxStream] [6][Server] StreamID=3 Constructor. Initial local window: 262144, Initial remote window (our send): 262144, Max frame size: 16384
2026-02-02T15:35:35.868126 [FINER] [YamuxStream] [6][Server] StreamID=3 open() called. Current state: YamuxStreamState.init
2026-02-02T15:35:35.868126 [FINE] [YamuxStream] [6][Server] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:35.868126 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
2026-02-02T15:35:35.868126 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
2026-02-02T15:35:35.868126 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:35.868126 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:35.868126 [FINER] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Writing 30 bytes: 001c424920cc5df1eb910f244656640d1ed1cf61e937be5397705e9b85fb
2026-02-02T15:35:35.868126 [FINEST] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - RAW_SOCKET_DATA_CHUNK_RECV (60 bytes): 001c305d602121312cc46a75c700352a360a587e448ac4c66738d92a53c3001c424920cc5df1eb910f244656640d1ed1cf61e937be5397705e9b85fb
2026-02-02T15:35:35.869126 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(941685aa) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.870125 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(941685aa) END (from buffer). Returning 2 bytes: 001c. Buffer after: 58 bytes: 305d602121312cc46a75c700352a360a587e448ac4c66738d92a53c3001c424920cc5df1eb910f244656640d1ed1cf61e937be5397705e9b85fb
2026-02-02T15:35:35.870125 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:35.870125 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.870125 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:35.870125 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:35.870125 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:35.870125 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:35.870125 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:35.870125 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(dc871eb8) START. Requested: 28. Buffer: 58 bytes.
2026-02-02T15:35:35.870125 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(dc871eb8) END (from buffer). Returning 28 bytes: 305d602121312cc46a75c700352a360a587e448ac4c66738d92a53c3. Buffer after: 30 bytes: 001c424920cc5df1eb910f244656640d1ed1cf61e937be5397705e9b85fb
2026-02-02T15:35:35.870125 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [48, 93, 96, 33]
2026-02-02T15:35:35.870125 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:35.870125 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 305d602121312cc46a75c700352a360a587e448ac4c66738d92a53c3
2026-02-02T15:35:35.870125 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:35.870125 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:35.870125 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 305d602121312cc46a75c700
2026-02-02T15:35:35.870125 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 352a360a587e448ac4c66738d92a53c3
2026-02-02T15:35:35.870125 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [48, 93, 96, 33]
2026-02-02T15:35:35.870125 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [53, 42, 54, 10]
2026-02-02T15:35:35.870125 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [53, 42, 54, 10, 88, 126, 68, 138, 196, 198, 103, 56, 217, 42, 83, 195]
2026-02-02T15:35:35.871125 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.871125 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059908332): [196, 111, 39, 56, 13, 151, 79, 154, 112, 223, 4, 202, 83, 225, 2, 137, 100, 5, 79, 36, 20, 48, 160, 93, 8, 107, 75, 219, 116, 80, 189, 210]
2026-02-02T15:35:35.871125 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:35:35.871125 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:35.871125 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 2, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:35:35.871125 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.871125 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.871125 [FINER] [YamuxStream] [7][Client] StreamID=3 Received WINDOW_UPDATE on non-open/non-closing stream. State: YamuxStreamState.init. Ignoring.
2026-02-02T15:35:35.871125 [FINER] [YamuxStream] [7][Client] StreamID=3 open() called. Current state: YamuxStreamState.init
2026-02-02T15:35:35.871125 [FINE] [YamuxStream] [7][Client] StreamID=3 Stream opened. State: YamuxStreamState.open. Sending initial window update.
2026-02-02T15:35:35.871125 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0])
2026-02-02T15:35:35.871125 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=8
2026-02-02T15:35:35.872125 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:35.872125 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:35.872125 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 30 bytes: 001c1c5915337c61f665886ca07abc77b98d78f8e19d0551722af91ab441
2026-02-02T15:35:35.872125 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 30 bytes successfully. Data preview (hex): 001c1c5915337c61f665886ca07abc77b98d78f8...
2026-02-02T15:35:35.872125 [FINE] [SwarmConn] SwarmConn.newStream (0): Returned from this.conn.newStream(). Result type: YamuxStream, Stream ID: 3
2026-02-02T15:35:35.872125 [FINE] [SwarmConn] SwarmConn.newStream (0): Obtaining StreamManagementScope for SwarmStream using underlying muxed stream id: 3.
2026-02-02T15:35:35.872125 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068135872-3708 for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.873125 [FINE] [ConnectionHealthMonitor] Recording health success: Stream created successfully
2026-02-02T15:35:35.873125 [WARNING] [Swarm] Swarm.newStream: Successfully called (conn as SwarmConn).newStream() for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS. Returned Stream ID: 3, Stream protocol: Closure: () => String from Function 'protocol':.
2026-02-02T15:35:35.874124 [WARNING] [basichost] ✅ [newStream Phase 2] Stream 3 created to peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.874124 [WARNING] [basichost] 🎯 [newStream Phase 3] Waiting for identify on stream 3...
2026-02-02T15:35:35.874124 [FINE] [identify]  [IDENTIFY-WAIT-ALREADY-SUCCEEDED] Peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS already identified on this connection, skipping
2026-02-02T15:35:35.874124 [WARNING] [identify]  [IDENTIFY-WAIT-NO-COMPLETER] No completer to await for peer=12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS (e.g., connection was closed). Identify will not complete.
2026-02-02T15:35:35.874124 [WARNING] [basichost] ✅ [newStream Phase 3] Identify complete for stream 3
2026-02-02T15:35:35.874124 [FINE] [YamuxStream] [7][Client] StreamID=3 setDeadline() set to 2026-02-02T15:35:45.874124
2026-02-02T15:35:35.874124 [WARNING] [basichost] 🎯 [newStream Phase 4] Negotiating protocols [/ipfs/1.0.0] on stream 3...
2026-02-02T15:35:35.874124 [FINE] [YamuxStream] [7][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 262144
2026-02-02T15:35:35.875124 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:35.875124 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=9
2026-02-02T15:35:35.875124 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:35.876124 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:35.876124 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 50 bytes: 0030a20253260756539eeb9b15141b62847e9750d5ed591d633c0ee83c27a623615524245f38a837cc428d0bf963a170f102
2026-02-02T15:35:35.877124 [FINEST] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Flushed 30 bytes successfully. Data preview (hex): 001c424920cc5df1eb910f244656640d1ed1cf61...
2026-02-02T15:35:35.877124 [FINER] [YamuxStream] [6][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 0. Current our send window: 262144, New: 262144
2026-02-02T15:35:35.877124 [FINE] [Swarm] Accepted inbound stream 3 from 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL on conn 0
2026-02-02T15:35:35.877124 [FINE] [ResourceManagerImpl] Opened stream scope: stream-1770068135877-3260 for peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:35.877124 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read initiator's protocol ID.
2026-02-02T15:35:35.877124 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:35.878123 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.878123 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.878123 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.878123 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.878123 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.878123 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.878123 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.878123 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.878123 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.878123 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(3fb4deb0) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:35.878123 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(3fb4deb0) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 424920cc5df1eb910f244656640d1ed1cf61e937be5397705e9b85fb
2026-02-02T15:35:35.878123 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:35.878123 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.878123 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:35.878123 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:35.878123 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:35.878123 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:35.878123 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:35.879123 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(5f104117) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:35.879123 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(5f104117) END (from buffer). Returning 28 bytes: 424920cc5df1eb910f244656640d1ed1cf61e937be5397705e9b85fb. Buffer after: 0 bytes: 
2026-02-02T15:35:35.879123 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [66, 73, 32, 204]
2026-02-02T15:35:35.879123 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:35.879123 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 424920cc5df1eb910f244656640d1ed1cf61e937be5397705e9b85fb
2026-02-02T15:35:35.879123 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:35.879123 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:35.879123 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 424920cc5df1eb910f244656
2026-02-02T15:35:35.879123 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 640d1ed1cf61e937be5397705e9b85fb
2026-02-02T15:35:35.879123 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [66, 73, 32, 204]
2026-02-02T15:35:35.879123 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [100, 13, 30, 209]
2026-02-02T15:35:35.879123 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [100, 13, 30, 209, 207, 97, 233, 55, 190, 83, 151, 112, 94, 155, 133, 251]
2026-02-02T15:35:35.879123 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.879123 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059908332): [196, 111, 39, 56, 13, 151, 79, 154, 112, 223, 4, 202, 83, 225, 2, 137, 100, 5, 79, 36, 20, 48, 160, 93, 8, 107, 75, 219, 116, 80, 189, 210]
2026-02-02T15:35:35.880122 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 12 bytes
2026-02-02T15:35:35.880122 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:35.880122 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:35:35.880122 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.880122 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.880122 [FINER] [YamuxStream] [7][Client] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:35:35.880122 [FINEST] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - RAW_SOCKET_DATA_CHUNK_RECV (30 bytes): 001c1c5915337c61f665886ca07abc77b98d78f8e19d0551722af91ab441
2026-02-02T15:35:35.880122 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 50 bytes successfully. Data preview (hex): 0030a20253260756539eeb9b15141b62847e9750...
2026-02-02T15:35:35.880122 [FINE] [YamuxStream] [7][Client] StreamID=3 Direct write: Successfully wrote all 20 bytes in 5ms
2026-02-02T15:35:35.880122 [FINEST] [YamuxStream] [7][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:35.882627 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.882627 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.882627 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.882627 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.882627 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.882627 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.882627 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.882627 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.883632 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.883632 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(e9bfe3d7) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:35.883632 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(e9bfe3d7) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 1c5915337c61f665886ca07abc77b98d78f8e19d0551722af91ab441
2026-02-02T15:35:35.883632 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:35.883632 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.883632 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:35.883632 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:35.883632 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:35.883632 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:35.883632 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:35.883632 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(f1f2b815) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:35.883632 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(f1f2b815) END (from buffer). Returning 28 bytes: 1c5915337c61f665886ca07abc77b98d78f8e19d0551722af91ab441. Buffer after: 0 bytes: 
2026-02-02T15:35:35.883632 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [28, 89, 21, 51]
2026-02-02T15:35:35.883632 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:35.883632 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 1c5915337c61f665886ca07abc77b98d78f8e19d0551722af91ab441
2026-02-02T15:35:35.884632 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:35.884632 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:35.884632 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 1c5915337c61f665886ca07a
2026-02-02T15:35:35.884632 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: bc77b98d78f8e19d0551722af91ab441
2026-02-02T15:35:35.884632 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [28, 89, 21, 51]
2026-02-02T15:35:35.884632 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [188, 119, 185, 141]
2026-02-02T15:35:35.884632 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [188, 119, 185, 141, 120, 248, 225, 157, 5, 81, 114, 42, 249, 26, 180, 65]
2026-02-02T15:35:35.884632 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=8 ([0, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.884632 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065187257): [95, 246, 1, 216, 135, 227, 242, 112, 202, 241, 214, 253, 22, 206, 190, 195, 119, 150, 255, 228, 62, 54, 71, 23, 22, 221, 221, 41, 56, 34, 192, 64]
2026-02-02T15:35:35.884632 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=8, got 12 bytes
2026-02-02T15:35:35.884632 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:35.884632 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 4, 0, 0]
2026-02-02T15:35:35.885631 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.885631 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.885631 [FINER] [YamuxStream] [6][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 262144. Current our send window: 262144, New: 524288
2026-02-02T15:35:35.885631 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.885631 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.886631 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.886631 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.886631 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.886631 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.886631 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.886631 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.887631 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.887631 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(cb60aa80) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.887631 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(cb60aa80) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.887631 [FINEST] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030a20253260756539eeb9b15141b62847e9750d5ed591d633c0ee83c27a623615524245f38a837cc428d0bf963a170f102
2026-02-02T15:35:35.888631 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.888631 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.888631 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.888631 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.888631 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.888631 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.889629 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.889629 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.889629 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.889629 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(b052a1e0) START. Requested: 2. Buffer: 50 bytes.
2026-02-02T15:35:35.889629 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(b052a1e0) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: a20253260756539eeb9b15141b62847e9750d5ed591d633c0ee83c27a623615524245f38a837cc428d0bf963a170f102
2026-02-02T15:35:35.889629 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:35.889629 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.889629 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:35.889629 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:35.889629 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:35.889629 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:35.889629 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:35.889629 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(f83431a1) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:35.889629 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(f83431a1) END (from buffer). Returning 48 bytes: a20253260756539eeb9b15141b62847e9750d5ed591d633c0ee83c27a623615524245f38a837cc428d0bf963a170f102. Buffer after: 0 bytes: 
2026-02-02T15:35:35.889629 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [162, 2, 83, 38]
2026-02-02T15:35:35.890629 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:35.890629 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: a20253260756539eeb9b15141b62847e9750d5ed591d633c0ee83c27a623615524245f38a837cc428d0bf963a170f102
2026-02-02T15:35:35.890629 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:35.890629 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:35.890629 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: a20253260756539eeb9b15141b62847e9750d5ed591d633c0ee83c27a6236155
2026-02-02T15:35:35.890629 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 24245f38a837cc428d0bf963a170f102
2026-02-02T15:35:35.890629 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [162, 2, 83, 38]
2026-02-02T15:35:35.890629 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [36, 36, 95, 56]
2026-02-02T15:35:35.890629 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [36, 36, 95, 56, 168, 55, 204, 66, 141, 11, 249, 99, 161, 112, 241, 2]
2026-02-02T15:35:35.890629 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=9 ([0, 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.891630 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065187257): [95, 246, 1, 216, 135, 227, 242, 112, 202, 241, 214, 253, 22, 206, 190, 195, 119, 150, 255, 228, 62, 54, 71, 23, 22, 221, 221, 41, 56, 34, 192, 64]
2026-02-02T15:35:35.891630 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=9, got 32 bytes
2026-02-02T15:35:35.891630 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:35.891630 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:35:35.891630 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.891630 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.891630 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:35.892629 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.892629 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.892629 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.892629 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:35.893629 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:35.893629 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:35.893629 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:35.893629 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.893629 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:35.893629 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:35.893629 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:35.893629 [FINE] [multistream] [multistreamMuxer - negotiate] Read initiator's protocol ID: /multistream/1.0.0
2026-02-02T15:35:35.893629 [FINE] [multistream] [multistreamMuxer - negotiate] Sending our protocol ID: /multistream/1.0.0
2026-02-02T15:35:35.893629 [FINE] [YamuxStream] [6][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 20 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524288
2026-02-02T15:35:35.894630 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 32, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20, 19, 47, 109, 117, 108, 116, 105, 115])
2026-02-02T15:35:35.894630 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:35:35.894630 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 48 bytes (plaintext was 32)
2026-02-02T15:35:35.894630 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 50
2026-02-02T15:35:35.894630 [FINER] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Writing 50 bytes: 0030958367bb4f694739a4b6f27199112519cc6301db63d7f8bb09383b16fbb53e09b6a2db3106d96adaf0a42da06d07ede0
2026-02-02T15:35:35.900665 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.900665 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.900665 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.900665 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.900665 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.900665 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.900665 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.900665 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.900665 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.900665 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(d1e38f55) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.901664 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(d1e38f55) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.901664 [FINEST] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - RAW_SOCKET_DATA_CHUNK_RECV (50 bytes): 0030958367bb4f694739a4b6f27199112519cc6301db63d7f8bb09383b16fbb53e09b6a2db3106d96adaf0a42da06d07ede0
2026-02-02T15:35:35.901664 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(cb60aa80) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.901664 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(cb60aa80) END (from buffer). Returning 2 bytes: 0030. Buffer after: 48 bytes: 958367bb4f694739a4b6f27199112519cc6301db63d7f8bb09383b16fbb53e09b6a2db3106d96adaf0a42da06d07ede0
2026-02-02T15:35:35.901664 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 48]
2026-02-02T15:35:35.901664 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.901664 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 48]
2026-02-02T15:35:35.901664 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0030
2026-02-02T15:35:35.901664 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 48
2026-02-02T15:35:35.901664 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 48
2026-02-02T15:35:35.901664 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 48 more bytes (have 0/48)
2026-02-02T15:35:35.901664 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(aeec4226) START. Requested: 48. Buffer: 48 bytes.
2026-02-02T15:35:35.901664 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(aeec4226) END (from buffer). Returning 48 bytes: 958367bb4f694739a4b6f27199112519cc6301db63d7f8bb09383b16fbb53e09b6a2db3106d96adaf0a42da06d07ede0. Buffer after: 0 bytes: 
2026-02-02T15:35:35.901664 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 48 bytes. First 4 bytes: [149, 131, 103, 187]
2026-02-02T15:35:35.901664 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 48, Got: 48
2026-02-02T15:35:35.902665 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 48, Bytes: 958367bb4f694739a4b6f27199112519cc6301db63d7f8bb09383b16fbb53e09b6a2db3106d96adaf0a42da06d07ede0
2026-02-02T15:35:35.902665 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 48
2026-02-02T15:35:35.902665 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(32) and MAC(16)
2026-02-02T15:35:35.902665 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 958367bb4f694739a4b6f27199112519cc6301db63d7f8bb09383b16fbb53e09
2026-02-02T15:35:35.902665 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: b6a2db3106d96adaf0a42da06d07ede0
2026-02-02T15:35:35.902665 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [149, 131, 103, 187]
2026-02-02T15:35:35.902665 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [182, 162, 219, 49]
2026-02-02T15:35:35.902665 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [182, 162, 219, 49, 6, 217, 106, 218, 240, 164, 45, 160, 109, 7, 237, 224]
2026-02-02T15:35:35.902665 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.902665 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059908332): [196, 111, 39, 56, 13, 151, 79, 154, 112, 223, 4, 202, 83, 225, 2, 137, 100, 5, 79, 36, 20, 48, 160, 93, 8, 107, 75, 219, 116, 80, 189, 210]
2026-02-02T15:35:35.902665 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 32 bytes
2026-02-02T15:35:35.902665 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 32 bytes to _decryptedBuffer. New _decryptedBuffer.length: 32
2026-02-02T15:35:35.902665 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 20. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 20]
2026-02-02T15:35:35.902665 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.902665 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.903665 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=20
2026-02-02T15:35:35.903665 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.903665 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.903665 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.903665 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=20
2026-02-02T15:35:35.903665 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 20, _decryptedBuffer.length: 20
2026-02-02T15:35:35.903665 [FINER] [SecuredConnection] SecuredConnection.read (length=20): Returning 20 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [19, 47, 109, 117, 108, 116, 105, 115, 116, 114, 101, 97, 109, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:35.903665 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=20
2026-02-02T15:35:35.903665 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.903665 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 20, flags: 0
2026-02-02T15:35:35.903665 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 20 bytes directly to waiting reader
2026-02-02T15:35:35.903665 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 20
2026-02-02T15:35:35.903665 [FINE] [YamuxStream] [7][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 13 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:35:35.904664 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 25, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 13, 12, 47, 105, 112, 102, 115, 47, 49])
2026-02-02T15:35:35.904664 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=10
2026-02-02T15:35:35.904664 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 41 bytes (plaintext was 25)
2026-02-02T15:35:35.904664 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 43
2026-02-02T15:35:35.904664 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 43 bytes: 002923b88168c663c2f8d22af8dc1c2a16d69fba264df851f84ac9f43f4105a61fff009512b9341027ce2e
2026-02-02T15:35:35.911173 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 43 bytes successfully. Data preview (hex): 002923b88168c663c2f8d22af8dc1c2a16d69fba...
2026-02-02T15:35:35.911173 [FINE] [YamuxStream] [7][Client] StreamID=3 Direct write: Successfully wrote all 13 bytes in 7ms
2026-02-02T15:35:35.913173 [FINEST] [YamuxStream] [7][Client] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:35.914173 [FINEST] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Flushed 50 bytes successfully. Data preview (hex): 0030958367bb4f694739a4b6f27199112519cc63...
2026-02-02T15:35:35.914173 [FINE] [YamuxStream] [6][Server] StreamID=3 Direct write: Successfully wrote all 20 bytes in 20ms
2026-02-02T15:35:35.914173 [FINE] [multistream] [multistreamMuxer - negotiate] Sent our protocol ID.
2026-02-02T15:35:35.914173 [FINE] [multistream] [multistreamMuxer - negotiate] Waiting to read next protocol offer from initiator.
2026-02-02T15:35:35.914173 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: null) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:35.916171 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.916171 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.916171 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.916171 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.917172 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.917172 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.917172 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.917172 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.917172 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.917172 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(b226dfa2) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.917172 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(b226dfa2) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.918171 [FINEST] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - RAW_SOCKET_DATA_CHUNK_RECV (43 bytes): 002923b88168c663c2f8d22af8dc1c2a16d69fba264df851f84ac9f43f4105a61fff009512b9341027ce2e
2026-02-02T15:35:35.918171 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(d1e38f55) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.918171 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(d1e38f55) END (from buffer). Returning 2 bytes: 0029. Buffer after: 41 bytes: 23b88168c663c2f8d22af8dc1c2a16d69fba264df851f84ac9f43f4105a61fff009512b9341027ce2e
2026-02-02T15:35:35.918171 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 41]
2026-02-02T15:35:35.918171 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.918171 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 41]
2026-02-02T15:35:35.918171 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0029
2026-02-02T15:35:35.918171 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 41
2026-02-02T15:35:35.918171 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 41
2026-02-02T15:35:35.918171 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 41 more bytes (have 0/41)
2026-02-02T15:35:35.918171 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(199cf630) START. Requested: 41. Buffer: 41 bytes.
2026-02-02T15:35:35.918171 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(199cf630) END (from buffer). Returning 41 bytes: 23b88168c663c2f8d22af8dc1c2a16d69fba264df851f84ac9f43f4105a61fff009512b9341027ce2e. Buffer after: 0 bytes: 
2026-02-02T15:35:35.918171 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 41 bytes. First 4 bytes: [35, 184, 129, 104]
2026-02-02T15:35:35.918171 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 41, Got: 41
2026-02-02T15:35:35.919170 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 41, Bytes: 23b88168c663c2f8d22af8dc1c2a16d69fba264df851f84ac9f43f4105a61fff009512b9341027ce2e
2026-02-02T15:35:35.919170 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 41
2026-02-02T15:35:35.919170 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(25) and MAC(16)
2026-02-02T15:35:35.919170 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 23b88168c663c2f8d22af8dc1c2a16d69fba264df851f84ac9
2026-02-02T15:35:35.919170 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: f43f4105a61fff009512b9341027ce2e
2026-02-02T15:35:35.919170 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [35, 184, 129, 104]
2026-02-02T15:35:35.919170 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [244, 63, 65, 5]
2026-02-02T15:35:35.919170 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [244, 63, 65, 5, 166, 31, 255, 0, 149, 18, 185, 52, 16, 39, 206, 46]
2026-02-02T15:35:35.920169 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=10 ([0, 0, 0, 0, 10, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.920169 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065187257): [95, 246, 1, 216, 135, 227, 242, 112, 202, 241, 214, 253, 22, 206, 190, 195, 119, 150, 255, 228, 62, 54, 71, 23, 22, 221, 221, 41, 56, 34, 192, 64]
2026-02-02T15:35:35.920169 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=10, got 25 bytes
2026-02-02T15:35:35.920169 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 25 bytes to _decryptedBuffer. New _decryptedBuffer.length: 25
2026-02-02T15:35:35.920169 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 13. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 13]
2026-02-02T15:35:35.920169 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.920169 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.920169 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=13
2026-02-02T15:35:35.920169 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.920169 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.920169 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.920169 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=13
2026-02-02T15:35:35.921169 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 13, _decryptedBuffer.length: 13
2026-02-02T15:35:35.921169 [FINER] [SecuredConnection] SecuredConnection.read (length=13): Returning 13 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [12, 47, 105, 112, 102, 115, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:35.921169 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=13
2026-02-02T15:35:35.921169 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.921169 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 13, flags: 0
2026-02-02T15:35:35.921169 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 13 bytes directly to waiting reader
2026-02-02T15:35:35.921169 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 33
2026-02-02T15:35:35.923169 [FINE] [multistream] [multistreamMuxer - negotiate] Received protocol offer from initiator: "/ipfs/1.0.0"
2026-02-02T15:35:35.923169 [FINE] [multistream] [multistreamMuxer - negotiate] Finding handler for token: "/ipfs/1.0.0"
2026-02-02T15:35:35.923169 [FINE] [multistream] [multistreamMuxer - negotiate] Handler found for "/ipfs/1.0.0". Sending acknowledgment: "/ipfs/1.0.0".
2026-02-02T15:35:35.923169 [FINE] [YamuxStream] [6][Server] StreamID=3 YamuxStream.write: ENTERED. Requested to write 13 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524268
2026-02-02T15:35:35.924168 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 25, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 13, 12, 47, 105, 112, 102, 115, 47, 49])
2026-02-02T15:35:35.927178 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
2026-02-02T15:35:35.927178 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 41 bytes (plaintext was 25)
2026-02-02T15:35:35.927178 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 43
2026-02-02T15:35:35.928182 [FINER] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Writing 43 bytes: 0029139446a5aa6e6781c118ac75df751a82461b88c45d9487d1772f2968a589b8ca44b9f9daed2af3c0c1
2026-02-02T15:35:35.928182 [FINEST] [TCPConnection] TCPConnection.write (id: 96206504-8e50-4ad2-8989-1c17e1ad5893): Flushed 43 bytes successfully. Data preview (hex): 0029139446a5aa6e6781c118ac75df751a82461b...
2026-02-02T15:35:35.931181 [FINE] [YamuxStream] [6][Server] StreamID=3 Direct write: Successfully wrote all 13 bytes in 8ms
2026-02-02T15:35:35.931181 [FINE] [multistream] [multistreamMuxer - negotiate] Sent acknowledgment for "/ipfs/1.0.0".
2026-02-02T15:35:35.931181 [FINE] [multistream] [multistreamMuxer - negotiate] Returning protocol "/ipfs/1.0.0" and its handler.
2026-02-02T15:35:35.931181 [FINE] [multistream] [multistreamMuxer - handle] Protocol /ipfs/1.0.0 negotiated. Attempting to set protocol on stream scope and stream itself.
2026-02-02T15:35:35.931181 [FINE] [StreamScopeImpl] stream-1770068135877-3260: Setting protocol to /ipfs/1.0.0 for peer 12D3KooWL3CcMmp4ncBd778PABpdzF9pxbusGhWAqiQp1vqh5jqL
2026-02-02T15:35:35.931181 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/1.0.0
2026-02-02T15:35:35.931181 [FINE] [StreamScopeImpl] stream-1770068135877-3260: Successfully set protocol to /ipfs/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:35.931181 [FINE] [multistream] [multistreamMuxer - handle] Successfully set protocol /ipfs/1.0.0 on stream scope and stream. Proceeding to call handler.
2026-02-02T15:35:35.931181 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 0
2026-02-02T15:35:35.940471 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:35.948512 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.951324 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.951829 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.951829 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:35.951829 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:35.951829 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:35.951829 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:35.951829 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:35.951829 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(ef0df10e) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:35.951829 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(ef0df10e) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:35.952866 [FINEST] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - RAW_SOCKET_DATA_CHUNK_RECV (43 bytes): 0029139446a5aa6e6781c118ac75df751a82461b88c45d9487d1772f2968a589b8ca44b9f9daed2af3c0c1
2026-02-02T15:35:35.952866 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(b226dfa2) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:35.952866 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(b226dfa2) END (from buffer). Returning 2 bytes: 0029. Buffer after: 41 bytes: 139446a5aa6e6781c118ac75df751a82461b88c45d9487d1772f2968a589b8ca44b9f9daed2af3c0c1
2026-02-02T15:35:35.952866 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 41]
2026-02-02T15:35:35.952866 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:35.952866 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 41]
2026-02-02T15:35:35.952866 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 0029
2026-02-02T15:35:35.952866 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 41
2026-02-02T15:35:35.952866 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 41
2026-02-02T15:35:35.952866 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 41 more bytes (have 0/41)
2026-02-02T15:35:35.952866 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(0ea83b26) START. Requested: 41. Buffer: 41 bytes.
2026-02-02T15:35:35.953866 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(0ea83b26) END (from buffer). Returning 41 bytes: 139446a5aa6e6781c118ac75df751a82461b88c45d9487d1772f2968a589b8ca44b9f9daed2af3c0c1. Buffer after: 0 bytes: 
2026-02-02T15:35:35.953866 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 41 bytes. First 4 bytes: [19, 148, 70, 165]
2026-02-02T15:35:35.953866 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 41, Got: 41
2026-02-02T15:35:35.953866 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 41, Bytes: 139446a5aa6e6781c118ac75df751a82461b88c45d9487d1772f2968a589b8ca44b9f9daed2af3c0c1
2026-02-02T15:35:35.953866 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 41
2026-02-02T15:35:35.953866 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(25) and MAC(16)
2026-02-02T15:35:35.953866 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 139446a5aa6e6781c118ac75df751a82461b88c45d9487d177
2026-02-02T15:35:35.953866 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 2f2968a589b8ca44b9f9daed2af3c0c1
2026-02-02T15:35:35.953866 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [19, 148, 70, 165]
2026-02-02T15:35:35.963908 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [47, 41, 104, 165]
2026-02-02T15:35:35.963908 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [47, 41, 104, 165, 137, 184, 202, 68, 185, 249, 218, 237, 42, 243, 192, 193]
2026-02-02T15:35:35.963908 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=11 ([0, 0, 0, 0, 11, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.964909 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1059908332): [196, 111, 39, 56, 13, 151, 79, 154, 112, 223, 4, 202, 83, 225, 2, 137, 100, 5, 79, 36, 20, 48, 160, 93, 8, 107, 75, 219, 116, 80, 189, 210]
2026-02-02T15:35:35.964909 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=11, got 25 bytes
2026-02-02T15:35:35.964909 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 25 bytes to _decryptedBuffer. New _decryptedBuffer.length: 25
2026-02-02T15:35:35.964909 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 13. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 13]
2026-02-02T15:35:35.964909 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:35.964909 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.964909 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=13
2026-02-02T15:35:35.964909 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:35.964909 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:35.964909 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:35.964909 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=13
2026-02-02T15:35:35.964909 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 13, _decryptedBuffer.length: 13
2026-02-02T15:35:35.964909 [FINER] [SecuredConnection] SecuredConnection.read (length=13): Returning 13 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [12, 47, 105, 112, 102, 115, 47, 49, 46, 48, 46, 48, 10]
2026-02-02T15:35:35.964909 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=13
2026-02-02T15:35:35.964909 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:35.965908 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 13, flags: 0
2026-02-02T15:35:35.965908 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 13 bytes directly to waiting reader
2026-02-02T15:35:35.965908 [FINE] [YamuxStream] [7][Client] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 33
2026-02-02T15:35:35.965908 [WARNING] [basichost] ✅ [newStream Phase 4] Protocol negotiated: /ipfs/1.0.0 on stream 3
2026-02-02T15:35:35.965908 [FINE] [YamuxStream] [7][Client] StreamID=3 setDeadline() cleared (set to null)
2026-02-02T15:35:35.965908 [WARNING] [basichost] 🎯 [newStream Phase 5] Setting up protocol /ipfs/1.0.0 on stream 3...
2026-02-02T15:35:35.965908 [FINE] [StreamScopeImpl] stream-1770068135872-3708: Setting protocol to /ipfs/1.0.0 for peer 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.965908 [FINE] [ResourceManagerImpl] Creating new protocol scope: /ipfs/1.0.0
2026-02-02T15:35:35.965908 [FINE] [StreamScopeImpl] stream-1770068135872-3708: Successfully set protocol to /ipfs/1.0.0. Resources transferred, edges updated.
2026-02-02T15:35:35.965908 [WARNING] [basichost] ✅ [newStream Phase 5] Protocol setup complete for stream 3
2026-02-02T15:35:35.965908 [WARNING] [basichost] ✅ [newStream] COMPLETE - Returning stream 3 with protocol /ipfs/1.0.0
2026-02-02T15:35:35.965908 [FINE] [YamuxStream] [7][Client] StreamID=3 YamuxStream.write: ENTERED. Requested to write 302 bytes. Current state: YamuxStreamState.open, Our send window (remote receive): 524255
2026-02-02T15:35:35.967907 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 314, first 20 bytes: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 1, 46, 172, 2, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:35.967907 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=11
2026-02-02T15:35:35.967907 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 330 bytes (plaintext was 314)
2026-02-02T15:35:35.967907 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 332
2026-02-02T15:35:35.967907 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 332 bytes: 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
2026-02-02T15:35:35.968906 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 332 bytes successfully. Data preview (hex): 014a4e9d4fc7ffa94526ca1e5948d7a80d1f3334...
2026-02-02T15:35:35.968906 [FINE] [YamuxStream] [7][Client] StreamID=3 Direct write: Successfully wrote all 302 bytes in 0ms
2026-02-02T15:35:35.968906 [FINE] [SwarmStream] Closing stream 3
2026-02-02T15:35:35.968906 [FINE] [YamuxStream] [7][Client] StreamID=3 close() called. Current state: YamuxStreamState.open
2026-02-02T15:35:35.968906 [FINER] [YamuxStream] [7][Client] StreamID=3 Sending pending WINDOW_UPDATE for 33 consumed bytes before local FIN.
2026-02-02T15:35:35.968906 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 1, 0, 0, 0, 0, 0, 3, 0, 0, 0, 33])
2026-02-02T15:35:35.968906 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=12
2026-02-02T15:35:35.968906 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:35.969907 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:35.969907 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 30 bytes: 001cb67ece1d4b3dd3883837367950a38d72102f0e90b5e2e609b725a1d5
2026-02-02T15:35:35.969907 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 30 bytes successfully. Data preview (hex): 001cb67ece1d4b3dd3883837367950a38d72102f...
2026-02-02T15:35:35.969907 [FINER] [YamuxStream] [7][Client] StreamID=3 Sending FIN frame (DATA frame with FIN flag) for local close().
2026-02-02T15:35:35.969907 [FINER] [SecuredConnection] SecuredConnection.write: Plaintext data received (length: 12, first 20 bytes: [0, 0, 0, 4, 0, 0, 0, 3, 0, 0, 0, 0])
2026-02-02T15:35:35.969907 [FINE] [SecuredConnection] SecuredConnection: 🔑 ENCRYPTING with SEND NONCE=13
2026-02-02T15:35:35.970906 [FINER] [SecuredConnection] SecuredConnection: Writing frame: 28 bytes (plaintext was 12)
2026-02-02T15:35:35.970906 [FINER] [SecuredConnection] SecuredConnection: TO_UNDERLYING_WRITE - Length: 30
2026-02-02T15:35:35.970906 [FINER] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Writing 30 bytes: 001c550cb2d9faea71d36c46c737567cbbadedc2932ec2c2db3998a975ed
2026-02-02T15:35:35.971905 [FINEST] [TCPConnection] TCPConnection.write (id: c5c0a1f3-857f-47b2-88b1-76814b16c58b): Flushed 30 bytes successfully. Data preview (hex): 001c550cb2d9faea71d36c46c737567cbbadedc2...
2026-02-02T15:35:35.971905 [FINER] [YamuxStream] [7][Client] StreamID=3 close() ensuring cleanup. State before final cleanup: YamuxStreamState.closed (was YamuxStreamState.open).
2026-02-02T15:35:35.972906 [FINER] [YamuxStream] [7][Client] StreamID=3 _cleanup() called. State before cleanup: YamuxStreamState.closed
2026-02-02T15:35:35.972906 [FINER] [YamuxStream] [7][Client] StreamID=3 _cleanup() - state set to: YamuxStreamState.closed (was YamuxStreamState.closed)
2026-02-02T15:35:35.972906 [FINER] [YamuxStream] [7][Client] StreamID=3 _cleanup() closing incomingController.
2026-02-02T15:35:35.973905 [FINE] [YamuxStream] [7][Client] StreamID=3 _cleanup() finished. Final state: YamuxStreamState.closed
2026-02-02T15:35:35.973905 [FINE] [YamuxStream] [7][Client] StreamID=3 close() completed. Final state: YamuxStreamState.closed
2026-02-02T15:35:35.973905 [FINE] [SwarmStream] Stream 3: Cleaning up management scope
2026-02-02T15:35:35.973905 [FINE] [SwarmStream] Stream 3 closed
2026-02-02T15:35:35.975410 [FINE] [Libp2pRouter] [VERBOSE] Message sent successfully to 12D3KooWGgPZWUKNZ7x5WtrCRS7RUj9hJMBMre17Gn3okRkUxcCS
2026-02-02T15:35:35.989941 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:35.990942 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:35.993720 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:35.993720 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:35.993720 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:35.994724 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:35:35.994724 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:35.994724 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:35.994724 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:36.005282 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:36.005282 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:36.005282 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
01:06 +939 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:36.006286 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:36.006286 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
01:06 +939 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:06 +939 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:36.006286 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:36.006286 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:36.006286 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:36.006286 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:36.006847 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:36.006847 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:35:36.006847 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:36.006847 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:35:36.008862 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:36.008862 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:36.008862 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:36.008862 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:36.008862 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:36.008862 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:36.008862 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:36.008862 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:36.008862 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:36.008862 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(4377bc80) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:36.008862 [FINER] [TCPConnection] TCPConnection(c5c0a1f3-857f-47b2-88b1-76814b16c58b) - Read(4377bc80) ASYNC WAIT. Requested: 2. Buffer: 0
2026-02-02T15:35:36.009861 [FINEST] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - RAW_SOCKET_DATA_CHUNK_RECV (332 bytes): 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
2026-02-02T15:35:36.009861 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(ef0df10e) ASYNC AWOKE. Re-checking buffer.
2026-02-02T15:35:36.009861 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(ef0df10e) END (from buffer). Returning 2 bytes: 014a. Buffer after: 330 bytes: 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
2026-02-02T15:35:36.009861 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [1, 74]
2026-02-02T15:35:36.009861 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:36.009861 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [1, 74]
2026-02-02T15:35:36.009861 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 014a
2026-02-02T15:35:36.010862 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 330
2026-02-02T15:35:36.010862 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 330
2026-02-02T15:35:36.010862 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 330 more bytes (have 0/330)
2026-02-02T15:35:36.010862 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(6b04ff75) START. Requested: 330. Buffer: 330 bytes.
2026-02-02T15:35:36.010862 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(6b04ff75) END (from buffer). Returning 330 bytes: 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. Buffer after: 0 bytes: 
2026-02-02T15:35:36.010862 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 330 bytes. First 4 bytes: [78, 157, 79, 199]
2026-02-02T15:35:36.010862 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 330, Got: 330
2026-02-02T15:35:36.010862 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 330, Bytes: 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
2026-02-02T15:35:36.010862 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 330
2026-02-02T15:35:36.010862 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(314) and MAC(16)
2026-02-02T15:35:36.010862 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 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
2026-02-02T15:35:36.010862 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: fd749fa2f1ae82d8bfd3416601237c1c
2026-02-02T15:35:36.011861 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [78, 157, 79, 199]
2026-02-02T15:35:36.011861 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [253, 116, 159, 162]
2026-02-02T15:35:36.011861 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [253, 116, 159, 162, 241, 174, 130, 216, 191, 211, 65, 102, 1, 35, 124, 28]
2026-02-02T15:35:36.011861 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=11 ([0, 0, 0, 0, 11, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:36.011861 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065187257): [95, 246, 1, 216, 135, 227, 242, 112, 202, 241, 214, 253, 22, 206, 190, 195, 119, 150, 255, 228, 62, 54, 71, 23, 22, 221, 221, 41, 56, 34, 192, 64]
2026-02-02T15:35:36.011861 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=11, got 314 bytes
2026-02-02T15:35:36.011861 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 314 bytes to _decryptedBuffer. New _decryptedBuffer.length: 314
2026-02-02T15:35:36.011861 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 302. Data preview: [0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 1, 46]
2026-02-02T15:35:36.011861 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:36.011861 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:36.011861 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=302
2026-02-02T15:35:36.011861 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:36.011861 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:36.011861 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:36.011861 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=302
2026-02-02T15:35:36.012861 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 302, _decryptedBuffer.length: 302
2026-02-02T15:35:36.012861 [FINER] [SecuredConnection] SecuredConnection.read (length=302): Returning 302 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [172, 2, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]
2026-02-02T15:35:36.012861 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=302
2026-02-02T15:35:36.012861 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:36.012861 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 302, flags: 0
2026-02-02T15:35:36.012861 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-DATA-DIRECT] Delivered 302 bytes directly to waiting reader
2026-02-02T15:35:36.012861 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-WINDOW] Consumed for local window: 335
2026-02-02T15:35:36.012861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.012861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 301 bytes from queue.
2026-02-02T15:35:36.012861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 301. Returning partial and re-queuing 300 bytes.
2026-02-02T15:35:36.012861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.012861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 300 bytes from queue.
2026-02-02T15:35:36.012861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 300. Returning partial and re-queuing 299 bytes.
2026-02-02T15:35:36.012861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.013861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 299 bytes from queue.
2026-02-02T15:35:36.013861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 299. Returning partial and re-queuing 298 bytes.
2026-02-02T15:35:36.013861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.013861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 298 bytes from queue.
2026-02-02T15:35:36.013861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 298. Returning partial and re-queuing 297 bytes.
2026-02-02T15:35:36.013861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.013861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 297 bytes from queue.
2026-02-02T15:35:36.013861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 297. Returning partial and re-queuing 296 bytes.
2026-02-02T15:35:36.013861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.013861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 296 bytes from queue.
2026-02-02T15:35:36.013861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 296. Returning partial and re-queuing 295 bytes.
2026-02-02T15:35:36.013861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.013861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 295 bytes from queue.
2026-02-02T15:35:36.013861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 295. Returning partial and re-queuing 294 bytes.
2026-02-02T15:35:36.013861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.013861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 294 bytes from queue.
2026-02-02T15:35:36.013861 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 294. Returning partial and re-queuing 293 bytes.
2026-02-02T15:35:36.014860 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.014860 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 293 bytes from queue.
2026-02-02T15:35:36.014860 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 293. Returning partial and re-queuing 292 bytes.
2026-02-02T15:35:36.014860 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.014860 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 292 bytes from queue.
2026-02-02T15:35:36.014860 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 292. Returning partial and re-queuing 291 bytes.
2026-02-02T15:35:36.015365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.015365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 291 bytes from queue.
2026-02-02T15:35:36.015365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 291. Returning partial and re-queuing 290 bytes.
2026-02-02T15:35:36.015365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.015365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 290 bytes from queue.
2026-02-02T15:35:36.015365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 290. Returning partial and re-queuing 289 bytes.
2026-02-02T15:35:36.015365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.015365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 289 bytes from queue.
2026-02-02T15:35:36.015365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 289. Returning partial and re-queuing 288 bytes.
2026-02-02T15:35:36.015365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.015365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 288 bytes from queue.
2026-02-02T15:35:36.015365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 288. Returning partial and re-queuing 287 bytes.
2026-02-02T15:35:36.015365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.015365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 287 bytes from queue.
2026-02-02T15:35:36.015365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 287. Returning partial and re-queuing 286 bytes.
2026-02-02T15:35:36.015365 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 286 bytes from queue.
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 286. Returning partial and re-queuing 285 bytes.
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 285 bytes from queue.
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 285. Returning partial and re-queuing 284 bytes.
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 284 bytes from queue.
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 284. Returning partial and re-queuing 283 bytes.
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 283 bytes from queue.
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 283. Returning partial and re-queuing 282 bytes.
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 282 bytes from queue.
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 282. Returning partial and re-queuing 281 bytes.
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 281 bytes from queue.
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 281. Returning partial and re-queuing 280 bytes.
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 280 bytes from queue.
2026-02-02T15:35:36.016368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 280. Returning partial and re-queuing 279 bytes.
2026-02-02T15:35:36.017368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.017368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 279 bytes from queue.
2026-02-02T15:35:36.017368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 279. Returning partial and re-queuing 278 bytes.
2026-02-02T15:35:36.017368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.017368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 278 bytes from queue.
2026-02-02T15:35:36.017368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 278. Returning partial and re-queuing 277 bytes.
2026-02-02T15:35:36.017368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.017368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 277 bytes from queue.
2026-02-02T15:35:36.017368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 277. Returning partial and re-queuing 276 bytes.
2026-02-02T15:35:36.017368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.017368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 276 bytes from queue.
2026-02-02T15:35:36.017368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 276. Returning partial and re-queuing 275 bytes.
2026-02-02T15:35:36.017368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.017368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 275 bytes from queue.
2026-02-02T15:35:36.017368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 275. Returning partial and re-queuing 274 bytes.
2026-02-02T15:35:36.017368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.017368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 274 bytes from queue.
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 274. Returning partial and re-queuing 273 bytes.
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 273 bytes from queue.
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 273. Returning partial and re-queuing 272 bytes.
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 272 bytes from queue.
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 272. Returning partial and re-queuing 271 bytes.
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 271 bytes from queue.
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 271. Returning partial and re-queuing 270 bytes.
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 270 bytes from queue.
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 270. Returning partial and re-queuing 269 bytes.
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 269 bytes from queue.
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 269. Returning partial and re-queuing 268 bytes.
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.018368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 268 bytes from queue.
2026-02-02T15:35:36.019368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 268. Returning partial and re-queuing 267 bytes.
2026-02-02T15:35:36.019368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.019368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 267 bytes from queue.
2026-02-02T15:35:36.019368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 267. Returning partial and re-queuing 266 bytes.
2026-02-02T15:35:36.019368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.019368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 266 bytes from queue.
2026-02-02T15:35:36.019368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 266. Returning partial and re-queuing 265 bytes.
2026-02-02T15:35:36.019368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.019368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 265 bytes from queue.
2026-02-02T15:35:36.019368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 265. Returning partial and re-queuing 264 bytes.
2026-02-02T15:35:36.019368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.019368 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 264 bytes from queue.
2026-02-02T15:35:36.020119 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 264. Returning partial and re-queuing 263 bytes.
2026-02-02T15:35:36.020119 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.020119 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 263 bytes from queue.
2026-02-02T15:35:36.020119 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 263. Returning partial and re-queuing 262 bytes.
2026-02-02T15:35:36.020119 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.020119 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 262 bytes from queue.
2026-02-02T15:35:36.020119 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 262. Returning partial and re-queuing 261 bytes.
2026-02-02T15:35:36.020119 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.020119 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 261 bytes from queue.
2026-02-02T15:35:36.020119 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 261. Returning partial and re-queuing 260 bytes.
2026-02-02T15:35:36.020119 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.020119 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 260 bytes from queue.
2026-02-02T15:35:36.020119 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 260. Returning partial and re-queuing 259 bytes.
2026-02-02T15:35:36.020119 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.020119 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 259 bytes from queue.
2026-02-02T15:35:36.020119 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 259. Returning partial and re-queuing 258 bytes.
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 258 bytes from queue.
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 258. Returning partial and re-queuing 257 bytes.
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 257 bytes from queue.
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 257. Returning partial and re-queuing 256 bytes.
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 256 bytes from queue.
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 256. Returning partial and re-queuing 255 bytes.
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 255 bytes from queue.
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 255. Returning partial and re-queuing 254 bytes.
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 254 bytes from queue.
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 254. Returning partial and re-queuing 253 bytes.
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 253 bytes from queue.
2026-02-02T15:35:36.020982 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 253. Returning partial and re-queuing 252 bytes.
2026-02-02T15:35:36.021986 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.021986 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 252 bytes from queue.
2026-02-02T15:35:36.021986 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 252. Returning partial and re-queuing 251 bytes.
2026-02-02T15:35:36.021986 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.021986 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 251 bytes from queue.
2026-02-02T15:35:36.021986 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 251. Returning partial and re-queuing 250 bytes.
2026-02-02T15:35:36.021986 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.021986 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 250 bytes from queue.
2026-02-02T15:35:36.021986 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 250. Returning partial and re-queuing 249 bytes.
2026-02-02T15:35:36.021986 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.021986 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 249 bytes from queue.
2026-02-02T15:35:36.021986 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 249. Returning partial and re-queuing 248 bytes.
2026-02-02T15:35:36.021986 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.021986 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 248 bytes from queue.
2026-02-02T15:35:36.021986 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 248. Returning partial and re-queuing 247 bytes.
2026-02-02T15:35:36.021986 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.021986 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 247 bytes from queue.
2026-02-02T15:35:36.022985 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 247. Returning partial and re-queuing 246 bytes.
2026-02-02T15:35:36.022985 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.022985 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 246 bytes from queue.
2026-02-02T15:35:36.022985 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 246. Returning partial and re-queuing 245 bytes.
2026-02-02T15:35:36.022985 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.022985 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 245 bytes from queue.
2026-02-02T15:35:36.022985 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 245. Returning partial and re-queuing 244 bytes.
2026-02-02T15:35:36.022985 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.022985 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 244 bytes from queue.
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 244. Returning partial and re-queuing 243 bytes.
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 243 bytes from queue.
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 243. Returning partial and re-queuing 242 bytes.
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 242 bytes from queue.
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 242. Returning partial and re-queuing 241 bytes.
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 241 bytes from queue.
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 241. Returning partial and re-queuing 240 bytes.
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 240 bytes from queue.
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 240. Returning partial and re-queuing 239 bytes.
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 239 bytes from queue.
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 239. Returning partial and re-queuing 238 bytes.
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.023490 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 238 bytes from queue.
2026-02-02T15:35:36.024494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 238. Returning partial and re-queuing 237 bytes.
2026-02-02T15:35:36.024494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.024494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 237 bytes from queue.
2026-02-02T15:35:36.024494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 237. Returning partial and re-queuing 236 bytes.
2026-02-02T15:35:36.024494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.024494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 236 bytes from queue.
2026-02-02T15:35:36.024494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 236. Returning partial and re-queuing 235 bytes.
2026-02-02T15:35:36.024494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.024494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 235 bytes from queue.
2026-02-02T15:35:36.024494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 235. Returning partial and re-queuing 234 bytes.
2026-02-02T15:35:36.024494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.024494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 234 bytes from queue.
2026-02-02T15:35:36.024494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 234. Returning partial and re-queuing 233 bytes.
2026-02-02T15:35:36.024494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.024494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 233 bytes from queue.
2026-02-02T15:35:36.024494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 233. Returning partial and re-queuing 232 bytes.
2026-02-02T15:35:36.024494 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.025493 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 232 bytes from queue.
2026-02-02T15:35:36.025493 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 232. Returning partial and re-queuing 231 bytes.
2026-02-02T15:35:36.025493 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.025493 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 231 bytes from queue.
2026-02-02T15:35:36.025493 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 231. Returning partial and re-queuing 230 bytes.
2026-02-02T15:35:36.025997 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.025997 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 230 bytes from queue.
2026-02-02T15:35:36.025997 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 230. Returning partial and re-queuing 229 bytes.
2026-02-02T15:35:36.025997 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.025997 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 229 bytes from queue.
2026-02-02T15:35:36.025997 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 229. Returning partial and re-queuing 228 bytes.
2026-02-02T15:35:36.025997 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.025997 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 228 bytes from queue.
2026-02-02T15:35:36.025997 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 228. Returning partial and re-queuing 227 bytes.
2026-02-02T15:35:36.025997 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.025997 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 227 bytes from queue.
2026-02-02T15:35:36.025997 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 227. Returning partial and re-queuing 226 bytes.
2026-02-02T15:35:36.025997 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.025997 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 226 bytes from queue.
2026-02-02T15:35:36.027001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 226. Returning partial and re-queuing 225 bytes.
2026-02-02T15:35:36.027001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.027001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 225 bytes from queue.
2026-02-02T15:35:36.027001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 225. Returning partial and re-queuing 224 bytes.
2026-02-02T15:35:36.027001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.027001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 224 bytes from queue.
2026-02-02T15:35:36.027001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 224. Returning partial and re-queuing 223 bytes.
2026-02-02T15:35:36.027001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.027001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 223 bytes from queue.
2026-02-02T15:35:36.027001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 223. Returning partial and re-queuing 222 bytes.
2026-02-02T15:35:36.027001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.027001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 222 bytes from queue.
2026-02-02T15:35:36.027001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 222. Returning partial and re-queuing 221 bytes.
2026-02-02T15:35:36.027001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.027001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 221 bytes from queue.
2026-02-02T15:35:36.027001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 221. Returning partial and re-queuing 220 bytes.
2026-02-02T15:35:36.028002 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.028002 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 220 bytes from queue.
2026-02-02T15:35:36.028002 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 220. Returning partial and re-queuing 219 bytes.
2026-02-02T15:35:36.028002 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.028002 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 219 bytes from queue.
2026-02-02T15:35:36.028002 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 219. Returning partial and re-queuing 218 bytes.
2026-02-02T15:35:36.028002 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.028002 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 218 bytes from queue.
2026-02-02T15:35:36.028002 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 218. Returning partial and re-queuing 217 bytes.
2026-02-02T15:35:36.028002 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.028002 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 217 bytes from queue.
2026-02-02T15:35:36.028002 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 217. Returning partial and re-queuing 216 bytes.
2026-02-02T15:35:36.028002 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.028002 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 216 bytes from queue.
2026-02-02T15:35:36.028002 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 216. Returning partial and re-queuing 215 bytes.
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 215 bytes from queue.
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 215. Returning partial and re-queuing 214 bytes.
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 214 bytes from queue.
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 214. Returning partial and re-queuing 213 bytes.
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 213 bytes from queue.
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 213. Returning partial and re-queuing 212 bytes.
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 212 bytes from queue.
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 212. Returning partial and re-queuing 211 bytes.
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 211 bytes from queue.
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 211. Returning partial and re-queuing 210 bytes.
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 210 bytes from queue.
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 210. Returning partial and re-queuing 209 bytes.
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 209 bytes from queue.
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 209. Returning partial and re-queuing 208 bytes.
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 208 bytes from queue.
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 208. Returning partial and re-queuing 207 bytes.
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.029001 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 207 bytes from queue.
2026-02-02T15:35:36.030506 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 207. Returning partial and re-queuing 206 bytes.
2026-02-02T15:35:36.030506 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.030506 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 206 bytes from queue.
2026-02-02T15:35:36.030506 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 206. Returning partial and re-queuing 205 bytes.
2026-02-02T15:35:36.030506 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.030506 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 205 bytes from queue.
2026-02-02T15:35:36.030506 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 205. Returning partial and re-queuing 204 bytes.
2026-02-02T15:35:36.030506 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.030506 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 204 bytes from queue.
2026-02-02T15:35:36.030506 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 204. Returning partial and re-queuing 203 bytes.
2026-02-02T15:35:36.030506 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.030506 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 203 bytes from queue.
2026-02-02T15:35:36.030506 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 203. Returning partial and re-queuing 202 bytes.
2026-02-02T15:35:36.030506 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.031510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 202 bytes from queue.
2026-02-02T15:35:36.031510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 202. Returning partial and re-queuing 201 bytes.
2026-02-02T15:35:36.031510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.031510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 201 bytes from queue.
2026-02-02T15:35:36.031510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 201. Returning partial and re-queuing 200 bytes.
2026-02-02T15:35:36.031510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.031510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 200 bytes from queue.
2026-02-02T15:35:36.031510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 200. Returning partial and re-queuing 199 bytes.
2026-02-02T15:35:36.031510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.031510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 199 bytes from queue.
2026-02-02T15:35:36.031510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 199. Returning partial and re-queuing 198 bytes.
2026-02-02T15:35:36.031510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.031510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 198 bytes from queue.
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 198. Returning partial and re-queuing 197 bytes.
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 197 bytes from queue.
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 197. Returning partial and re-queuing 196 bytes.
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 196 bytes from queue.
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 196. Returning partial and re-queuing 195 bytes.
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 195 bytes from queue.
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 195. Returning partial and re-queuing 194 bytes.
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 194 bytes from queue.
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 194. Returning partial and re-queuing 193 bytes.
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 193 bytes from queue.
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 193. Returning partial and re-queuing 192 bytes.
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 192 bytes from queue.
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 192. Returning partial and re-queuing 191 bytes.
2026-02-02T15:35:36.032509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 191 bytes from queue.
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 191. Returning partial and re-queuing 190 bytes.
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 190 bytes from queue.
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 190. Returning partial and re-queuing 189 bytes.
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 189 bytes from queue.
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 189. Returning partial and re-queuing 188 bytes.
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 188 bytes from queue.
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 188. Returning partial and re-queuing 187 bytes.
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 187 bytes from queue.
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 187. Returning partial and re-queuing 186 bytes.
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 186 bytes from queue.
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 186. Returning partial and re-queuing 185 bytes.
2026-02-02T15:35:36.033510 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 185 bytes from queue.
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 185. Returning partial and re-queuing 184 bytes.
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 184 bytes from queue.
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 184. Returning partial and re-queuing 183 bytes.
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 183 bytes from queue.
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 183. Returning partial and re-queuing 182 bytes.
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 182 bytes from queue.
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 182. Returning partial and re-queuing 181 bytes.
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 181 bytes from queue.
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 181. Returning partial and re-queuing 180 bytes.
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 180 bytes from queue.
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 180. Returning partial and re-queuing 179 bytes.
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 179 bytes from queue.
2026-02-02T15:35:36.034509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 179. Returning partial and re-queuing 178 bytes.
2026-02-02T15:35:36.035509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.035509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 178 bytes from queue.
2026-02-02T15:35:36.035509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 178. Returning partial and re-queuing 177 bytes.
2026-02-02T15:35:36.035509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.035509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 177 bytes from queue.
2026-02-02T15:35:36.035509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 177. Returning partial and re-queuing 176 bytes.
2026-02-02T15:35:36.035509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.035509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 176 bytes from queue.
2026-02-02T15:35:36.035509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 176. Returning partial and re-queuing 175 bytes.
2026-02-02T15:35:36.035509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.035509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 175 bytes from queue.
2026-02-02T15:35:36.035509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 175. Returning partial and re-queuing 174 bytes.
2026-02-02T15:35:36.035509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.035509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 174 bytes from queue.
2026-02-02T15:35:36.035509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 174. Returning partial and re-queuing 173 bytes.
2026-02-02T15:35:36.035509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 173 bytes from queue.
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 173. Returning partial and re-queuing 172 bytes.
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 172 bytes from queue.
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 172. Returning partial and re-queuing 171 bytes.
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 171 bytes from queue.
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 171. Returning partial and re-queuing 170 bytes.
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 170 bytes from queue.
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 170. Returning partial and re-queuing 169 bytes.
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 169 bytes from queue.
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 169. Returning partial and re-queuing 168 bytes.
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 168 bytes from queue.
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 168. Returning partial and re-queuing 167 bytes.
2026-02-02T15:35:36.036509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 167 bytes from queue.
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 167. Returning partial and re-queuing 166 bytes.
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 166 bytes from queue.
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 166. Returning partial and re-queuing 165 bytes.
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 165 bytes from queue.
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 165. Returning partial and re-queuing 164 bytes.
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 164 bytes from queue.
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 164. Returning partial and re-queuing 163 bytes.
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 163 bytes from queue.
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 163. Returning partial and re-queuing 162 bytes.
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 162 bytes from queue.
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 162. Returning partial and re-queuing 161 bytes.
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.037508 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 161 bytes from queue.
2026-02-02T15:35:36.038509 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 161. Returning partial and re-queuing 160 bytes.
2026-02-02T15:35:36.038825 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.038825 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 160 bytes from queue.
2026-02-02T15:35:36.038825 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 160. Returning partial and re-queuing 159 bytes.
2026-02-02T15:35:36.038825 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.038825 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 159 bytes from queue.
2026-02-02T15:35:36.038825 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 159. Returning partial and re-queuing 158 bytes.
2026-02-02T15:35:36.038825 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.038825 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 158 bytes from queue.
2026-02-02T15:35:36.038825 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 158. Returning partial and re-queuing 157 bytes.
2026-02-02T15:35:36.038825 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.038825 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 157 bytes from queue.
2026-02-02T15:35:36.038825 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 157. Returning partial and re-queuing 156 bytes.
2026-02-02T15:35:36.038825 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.038825 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 156 bytes from queue.
2026-02-02T15:35:36.038825 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 156. Returning partial and re-queuing 155 bytes.
2026-02-02T15:35:36.038825 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.038825 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 155 bytes from queue.
2026-02-02T15:35:36.040330 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 155. Returning partial and re-queuing 154 bytes.
2026-02-02T15:35:36.040330 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.040330 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 154 bytes from queue.
2026-02-02T15:35:36.040330 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 154. Returning partial and re-queuing 153 bytes.
2026-02-02T15:35:36.040330 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.040330 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 153 bytes from queue.
2026-02-02T15:35:36.040330 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 153. Returning partial and re-queuing 152 bytes.
2026-02-02T15:35:36.040330 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.040330 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 152 bytes from queue.
2026-02-02T15:35:36.040330 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 152. Returning partial and re-queuing 151 bytes.
2026-02-02T15:35:36.040330 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.040330 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 151 bytes from queue.
2026-02-02T15:35:36.040330 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 151. Returning partial and re-queuing 150 bytes.
2026-02-02T15:35:36.040330 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.040330 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 150 bytes from queue.
2026-02-02T15:35:36.040330 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 150. Returning partial and re-queuing 149 bytes.
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 149 bytes from queue.
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 149. Returning partial and re-queuing 148 bytes.
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 148 bytes from queue.
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 148. Returning partial and re-queuing 147 bytes.
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 147 bytes from queue.
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 147. Returning partial and re-queuing 146 bytes.
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 146 bytes from queue.
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 146. Returning partial and re-queuing 145 bytes.
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 145 bytes from queue.
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 145. Returning partial and re-queuing 144 bytes.
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 144 bytes from queue.
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 144. Returning partial and re-queuing 143 bytes.
2026-02-02T15:35:36.041349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.042349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 143 bytes from queue.
2026-02-02T15:35:36.043348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 143. Returning partial and re-queuing 142 bytes.
2026-02-02T15:35:36.043348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.043348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 142 bytes from queue.
2026-02-02T15:35:36.043348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 142. Returning partial and re-queuing 141 bytes.
2026-02-02T15:35:36.043348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.043348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 141 bytes from queue.
2026-02-02T15:35:36.044349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 141. Returning partial and re-queuing 140 bytes.
2026-02-02T15:35:36.044349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.044349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 140 bytes from queue.
2026-02-02T15:35:36.044349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 140. Returning partial and re-queuing 139 bytes.
2026-02-02T15:35:36.044349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.044349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 139 bytes from queue.
2026-02-02T15:35:36.044349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 139. Returning partial and re-queuing 138 bytes.
2026-02-02T15:35:36.044349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.044349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 138 bytes from queue.
2026-02-02T15:35:36.044349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 138. Returning partial and re-queuing 137 bytes.
2026-02-02T15:35:36.044349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.044349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 137 bytes from queue.
2026-02-02T15:35:36.044349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 137. Returning partial and re-queuing 136 bytes.
2026-02-02T15:35:36.044349 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.046348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 136 bytes from queue.
2026-02-02T15:35:36.046348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 136. Returning partial and re-queuing 135 bytes.
2026-02-02T15:35:36.046348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.046348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 135 bytes from queue.
2026-02-02T15:35:36.046348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 135. Returning partial and re-queuing 134 bytes.
2026-02-02T15:35:36.046348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.046348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 134 bytes from queue.
2026-02-02T15:35:36.047348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 134. Returning partial and re-queuing 133 bytes.
2026-02-02T15:35:36.047348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.047348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 133 bytes from queue.
2026-02-02T15:35:36.047348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 133. Returning partial and re-queuing 132 bytes.
2026-02-02T15:35:36.047348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.047348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 132 bytes from queue.
2026-02-02T15:35:36.047348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 132. Returning partial and re-queuing 131 bytes.
2026-02-02T15:35:36.047348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.047348 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 131 bytes from queue.
2026-02-02T15:35:36.048346 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 131. Returning partial and re-queuing 130 bytes.
2026-02-02T15:35:36.048346 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.048346 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 130 bytes from queue.
2026-02-02T15:35:36.048346 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 130. Returning partial and re-queuing 129 bytes.
2026-02-02T15:35:36.048346 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.049347 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 129 bytes from queue.
2026-02-02T15:35:36.049347 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 129. Returning partial and re-queuing 128 bytes.
2026-02-02T15:35:36.049347 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.049347 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 128 bytes from queue.
2026-02-02T15:35:36.049347 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 128. Returning partial and re-queuing 127 bytes.
2026-02-02T15:35:36.049347 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.049347 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 127 bytes from queue.
2026-02-02T15:35:36.049347 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 127. Returning partial and re-queuing 126 bytes.
2026-02-02T15:35:36.049852 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.049852 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 126 bytes from queue.
2026-02-02T15:35:36.049852 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 126. Returning partial and re-queuing 125 bytes.
2026-02-02T15:35:36.050856 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.050856 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 125 bytes from queue.
2026-02-02T15:35:36.050856 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 125. Returning partial and re-queuing 124 bytes.
2026-02-02T15:35:36.050856 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.050856 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 124 bytes from queue.
2026-02-02T15:35:36.050856 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 124. Returning partial and re-queuing 123 bytes.
2026-02-02T15:35:36.050856 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.050856 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 123 bytes from queue.
2026-02-02T15:35:36.051855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 123. Returning partial and re-queuing 122 bytes.
2026-02-02T15:35:36.051855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.051855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 122 bytes from queue.
2026-02-02T15:35:36.051855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 122. Returning partial and re-queuing 121 bytes.
2026-02-02T15:35:36.051855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.052855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 121 bytes from queue.
2026-02-02T15:35:36.052855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 121. Returning partial and re-queuing 120 bytes.
2026-02-02T15:35:36.052855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.052855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 120 bytes from queue.
2026-02-02T15:35:36.052855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 120. Returning partial and re-queuing 119 bytes.
2026-02-02T15:35:36.052855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.052855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 119 bytes from queue.
2026-02-02T15:35:36.052855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 119. Returning partial and re-queuing 118 bytes.
2026-02-02T15:35:36.053854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.053854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 118 bytes from queue.
2026-02-02T15:35:36.053854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 118. Returning partial and re-queuing 117 bytes.
2026-02-02T15:35:36.053854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.053854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 117 bytes from queue.
2026-02-02T15:35:36.053854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 117. Returning partial and re-queuing 116 bytes.
2026-02-02T15:35:36.053854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.054855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 116 bytes from queue.
2026-02-02T15:35:36.054855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 116. Returning partial and re-queuing 115 bytes.
2026-02-02T15:35:36.055855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.055855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 115 bytes from queue.
2026-02-02T15:35:36.055855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 115. Returning partial and re-queuing 114 bytes.
2026-02-02T15:35:36.055855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.055855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 114 bytes from queue.
2026-02-02T15:35:36.055855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 114. Returning partial and re-queuing 113 bytes.
2026-02-02T15:35:36.055855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.055855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 113 bytes from queue.
2026-02-02T15:35:36.055855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 113. Returning partial and re-queuing 112 bytes.
2026-02-02T15:35:36.055855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.055855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 112 bytes from queue.
2026-02-02T15:35:36.055855 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 112. Returning partial and re-queuing 111 bytes.
2026-02-02T15:35:36.056854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.056854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 111 bytes from queue.
2026-02-02T15:35:36.056854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 111. Returning partial and re-queuing 110 bytes.
2026-02-02T15:35:36.056854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.056854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 110 bytes from queue.
2026-02-02T15:35:36.056854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 110. Returning partial and re-queuing 109 bytes.
2026-02-02T15:35:36.056854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.056854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 109 bytes from queue.
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 109. Returning partial and re-queuing 108 bytes.
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 108 bytes from queue.
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 108. Returning partial and re-queuing 107 bytes.
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 107 bytes from queue.
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 107. Returning partial and re-queuing 106 bytes.
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 106 bytes from queue.
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 106. Returning partial and re-queuing 105 bytes.
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 105 bytes from queue.
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 105. Returning partial and re-queuing 104 bytes.
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 104 bytes from queue.
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 104. Returning partial and re-queuing 103 bytes.
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 103 bytes from queue.
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 103. Returning partial and re-queuing 102 bytes.
2026-02-02T15:35:36.057854 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.058829 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 102 bytes from queue.
2026-02-02T15:35:36.058829 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 102. Returning partial and re-queuing 101 bytes.
2026-02-02T15:35:36.059834 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.059834 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 101 bytes from queue.
2026-02-02T15:35:36.059834 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 101. Returning partial and re-queuing 100 bytes.
2026-02-02T15:35:36.059834 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.059834 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 100 bytes from queue.
2026-02-02T15:35:36.059834 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 100. Returning partial and re-queuing 99 bytes.
2026-02-02T15:35:36.059834 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.060833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 99 bytes from queue.
2026-02-02T15:35:36.060833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 99. Returning partial and re-queuing 98 bytes.
2026-02-02T15:35:36.060833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.060833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 98 bytes from queue.
2026-02-02T15:35:36.060833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 98. Returning partial and re-queuing 97 bytes.
2026-02-02T15:35:36.060833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.060833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 97 bytes from queue.
2026-02-02T15:35:36.060833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 97. Returning partial and re-queuing 96 bytes.
2026-02-02T15:35:36.060833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.061834 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 96 bytes from queue.
2026-02-02T15:35:36.061834 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 96. Returning partial and re-queuing 95 bytes.
2026-02-02T15:35:36.061834 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.061834 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 95 bytes from queue.
2026-02-02T15:35:36.061834 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 95. Returning partial and re-queuing 94 bytes.
2026-02-02T15:35:36.061834 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.061834 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 94 bytes from queue.
2026-02-02T15:35:36.062833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 94. Returning partial and re-queuing 93 bytes.
2026-02-02T15:35:36.062833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.062833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 93 bytes from queue.
2026-02-02T15:35:36.062833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 93. Returning partial and re-queuing 92 bytes.
2026-02-02T15:35:36.062833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.062833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 92 bytes from queue.
2026-02-02T15:35:36.062833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 92. Returning partial and re-queuing 91 bytes.
2026-02-02T15:35:36.062833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.062833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 91 bytes from queue.
2026-02-02T15:35:36.063833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 91. Returning partial and re-queuing 90 bytes.
2026-02-02T15:35:36.063833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.063833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 90 bytes from queue.
2026-02-02T15:35:36.063833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 90. Returning partial and re-queuing 89 bytes.
2026-02-02T15:35:36.063833 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.064148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 89 bytes from queue.
2026-02-02T15:35:36.064148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 89. Returning partial and re-queuing 88 bytes.
2026-02-02T15:35:36.064148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.064148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 88 bytes from queue.
2026-02-02T15:35:36.064148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 88. Returning partial and re-queuing 87 bytes.
2026-02-02T15:35:36.064148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.064148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 87 bytes from queue.
2026-02-02T15:35:36.064148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 87. Returning partial and re-queuing 86 bytes.
2026-02-02T15:35:36.064148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.064148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 86 bytes from queue.
2026-02-02T15:35:36.064148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 86. Returning partial and re-queuing 85 bytes.
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 85 bytes from queue.
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 85. Returning partial and re-queuing 84 bytes.
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 84 bytes from queue.
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 84. Returning partial and re-queuing 83 bytes.
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 83 bytes from queue.
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 83. Returning partial and re-queuing 82 bytes.
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 82 bytes from queue.
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 82. Returning partial and re-queuing 81 bytes.
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 81 bytes from queue.
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 81. Returning partial and re-queuing 80 bytes.
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 80 bytes from queue.
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 80. Returning partial and re-queuing 79 bytes.
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 79 bytes from queue.
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 79. Returning partial and re-queuing 78 bytes.
2026-02-02T15:35:36.064653 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 78 bytes from queue.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 78. Returning partial and re-queuing 77 bytes.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 77 bytes from queue.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 77. Returning partial and re-queuing 76 bytes.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 76 bytes from queue.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 76. Returning partial and re-queuing 75 bytes.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 75 bytes from queue.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 75. Returning partial and re-queuing 74 bytes.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 74 bytes from queue.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 74. Returning partial and re-queuing 73 bytes.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 73 bytes from queue.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 73. Returning partial and re-queuing 72 bytes.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 72 bytes from queue.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 72. Returning partial and re-queuing 71 bytes.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 71 bytes from queue.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 71. Returning partial and re-queuing 70 bytes.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 70 bytes from queue.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 70. Returning partial and re-queuing 69 bytes.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 69 bytes from queue.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 69. Returning partial and re-queuing 68 bytes.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 68 bytes from queue.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 68. Returning partial and re-queuing 67 bytes.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 67 bytes from queue.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 67. Returning partial and re-queuing 66 bytes.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 66 bytes from queue.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 66. Returning partial and re-queuing 65 bytes.
2026-02-02T15:35:36.065668 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 65 bytes from queue.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 65. Returning partial and re-queuing 64 bytes.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 64 bytes from queue.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 64. Returning partial and re-queuing 63 bytes.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 63 bytes from queue.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 63. Returning partial and re-queuing 62 bytes.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 62 bytes from queue.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 62. Returning partial and re-queuing 61 bytes.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 61 bytes from queue.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 61. Returning partial and re-queuing 60 bytes.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 60 bytes from queue.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 60. Returning partial and re-queuing 59 bytes.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 59 bytes from queue.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 59. Returning partial and re-queuing 58 bytes.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 58 bytes from queue.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 58. Returning partial and re-queuing 57 bytes.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 57 bytes from queue.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 57. Returning partial and re-queuing 56 bytes.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 56 bytes from queue.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 56. Returning partial and re-queuing 55 bytes.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 55 bytes from queue.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 55. Returning partial and re-queuing 54 bytes.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 54 bytes from queue.
2026-02-02T15:35:36.067148 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 54. Returning partial and re-queuing 53 bytes.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 53 bytes from queue.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 53. Returning partial and re-queuing 52 bytes.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 52 bytes from queue.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 52. Returning partial and re-queuing 51 bytes.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 51 bytes from queue.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 51. Returning partial and re-queuing 50 bytes.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 50 bytes from queue.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 50. Returning partial and re-queuing 49 bytes.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 49 bytes from queue.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 49. Returning partial and re-queuing 48 bytes.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 48 bytes from queue.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 48. Returning partial and re-queuing 47 bytes.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 47 bytes from queue.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 47. Returning partial and re-queuing 46 bytes.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 46 bytes from queue.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 46. Returning partial and re-queuing 45 bytes.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 45 bytes from queue.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 45. Returning partial and re-queuing 44 bytes.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 44 bytes from queue.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 44. Returning partial and re-queuing 43 bytes.
2026-02-02T15:35:36.068179 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.069176 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 43 bytes from queue.
2026-02-02T15:35:36.069176 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 43. Returning partial and re-queuing 42 bytes.
2026-02-02T15:35:36.069176 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.069176 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 42 bytes from queue.
2026-02-02T15:35:36.069176 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 42. Returning partial and re-queuing 41 bytes.
2026-02-02T15:35:36.069176 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.069176 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 41 bytes from queue.
2026-02-02T15:35:36.069176 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 41. Returning partial and re-queuing 40 bytes.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 40 bytes from queue.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 40. Returning partial and re-queuing 39 bytes.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 39 bytes from queue.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 39. Returning partial and re-queuing 38 bytes.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 38 bytes from queue.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 38. Returning partial and re-queuing 37 bytes.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 37 bytes from queue.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 37. Returning partial and re-queuing 36 bytes.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 36 bytes from queue.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 36. Returning partial and re-queuing 35 bytes.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 35 bytes from queue.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 35. Returning partial and re-queuing 34 bytes.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 34 bytes from queue.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 34. Returning partial and re-queuing 33 bytes.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 33 bytes from queue.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 33. Returning partial and re-queuing 32 bytes.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 32 bytes from queue.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 32. Returning partial and re-queuing 31 bytes.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 31 bytes from queue.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 31. Returning partial and re-queuing 30 bytes.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 30 bytes from queue.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 30. Returning partial and re-queuing 29 bytes.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 29 bytes from queue.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 29. Returning partial and re-queuing 28 bytes.
2026-02-02T15:35:36.069682 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 28 bytes from queue.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 28. Returning partial and re-queuing 27 bytes.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 27 bytes from queue.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 27. Returning partial and re-queuing 26 bytes.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 26 bytes from queue.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 26. Returning partial and re-queuing 25 bytes.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 25 bytes from queue.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 25. Returning partial and re-queuing 24 bytes.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 24 bytes from queue.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 24. Returning partial and re-queuing 23 bytes.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 23 bytes from queue.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 23. Returning partial and re-queuing 22 bytes.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 22 bytes from queue.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 22. Returning partial and re-queuing 21 bytes.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 21 bytes from queue.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 21. Returning partial and re-queuing 20 bytes.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 20 bytes from queue.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 20. Returning partial and re-queuing 19 bytes.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 19 bytes from queue.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 19. Returning partial and re-queuing 18 bytes.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 18 bytes from queue.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 18. Returning partial and re-queuing 17 bytes.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 17 bytes from queue.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 17. Returning partial and re-queuing 16 bytes.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 16 bytes from queue.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 16. Returning partial and re-queuing 15 bytes.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 15 bytes from queue.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 15. Returning partial and re-queuing 14 bytes.
2026-02-02T15:35:36.070708 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 14 bytes from queue.
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 14. Returning partial and re-queuing 13 bytes.
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 13 bytes from queue.
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 13. Returning partial and re-queuing 12 bytes.
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 12 bytes from queue.
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 12. Returning partial and re-queuing 11 bytes.
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 11 bytes from queue.
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 11. Returning partial and re-queuing 10 bytes.
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 10 bytes from queue.
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 10. Returning partial and re-queuing 9 bytes.
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 9 bytes from queue.
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 9. Returning partial and re-queuing 8 bytes.
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 8 bytes from queue.
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 8. Returning partial and re-queuing 7 bytes.
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 7 bytes from queue.
2026-02-02T15:35:36.072215 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 7. Returning partial and re-queuing 6 bytes.
2026-02-02T15:35:36.073316 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.073316 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 6 bytes from queue.
2026-02-02T15:35:36.073316 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 6. Returning partial and re-queuing 5 bytes.
2026-02-02T15:35:36.073316 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.073316 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 5 bytes from queue.
2026-02-02T15:35:36.073316 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 5. Returning partial and re-queuing 4 bytes.
2026-02-02T15:35:36.073316 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.073316 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 4 bytes from queue.
2026-02-02T15:35:36.073316 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 4. Returning partial and re-queuing 3 bytes.
2026-02-02T15:35:36.073316 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.073316 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 3 bytes from queue.
2026-02-02T15:35:36.073316 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 3. Returning partial and re-queuing 2 bytes.
2026-02-02T15:35:36.073316 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.073316 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 2 bytes from queue.
2026-02-02T15:35:36.073316 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() requested maxLength 1, data is 2. Returning partial and re-queuing 1 bytes.
2026-02-02T15:35:36.073316 [FINEST] [YamuxStream] [6][Server] StreamID=3 read(maxLength: 1) called. State: YamuxStreamState.open, Queue: 1
2026-02-02T15:35:36.073316 [FINEST] [YamuxStream] [6][Server] StreamID=3 read() returning 1 bytes from queue.
2026-02-02T15:35:36.074764 [SEVERE] [Libp2pRouter] [ERROR] Error handling stream for /ipfs/1.0.0
Error: Bad state: Cannot add new events after calling close
Stack trace: null
2026-02-02T15:35:36.080325 [FINEST] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - RAW_SOCKET_DATA_CHUNK_RECV (60 bytes): 001cb67ece1d4b3dd3883837367950a38d72102f0e90b5e2e609b725a1d5001c550cb2d9faea71d36c46c737567cbbadedc2932ec2c2db3998a975ed
2026-02-02T15:35:36.080325 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:36.080325 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:36.080325 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:36.081320 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:36.081320 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:36.081320 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:36.081320 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:36.081320 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:36.081320 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:36.081320 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(b094dacf) START. Requested: 2. Buffer: 60 bytes.
2026-02-02T15:35:36.081320 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(b094dacf) END (from buffer). Returning 2 bytes: 001c. Buffer after: 58 bytes: b67ece1d4b3dd3883837367950a38d72102f0e90b5e2e609b725a1d5001c550cb2d9faea71d36c46c737567cbbadedc2932ec2c2db3998a975ed
2026-02-02T15:35:36.081320 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:36.081320 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:36.081320 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:36.081320 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:36.081320 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:36.081320 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:36.081320 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:36.081320 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(e2c2f731) START. Requested: 28. Buffer: 58 bytes.
2026-02-02T15:35:36.081320 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(e2c2f731) END (from buffer). Returning 28 bytes: b67ece1d4b3dd3883837367950a38d72102f0e90b5e2e609b725a1d5. Buffer after: 30 bytes: 001c550cb2d9faea71d36c46c737567cbbadedc2932ec2c2db3998a975ed
2026-02-02T15:35:36.082828 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [182, 126, 206, 29]
2026-02-02T15:35:36.082828 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:36.082828 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: b67ece1d4b3dd3883837367950a38d72102f0e90b5e2e609b725a1d5
2026-02-02T15:35:36.082828 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:36.082828 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:36.082828 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: b67ece1d4b3dd38838373679
2026-02-02T15:35:36.082828 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 50a38d72102f0e90b5e2e609b725a1d5
2026-02-02T15:35:36.082828 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [182, 126, 206, 29]
2026-02-02T15:35:36.082828 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [80, 163, 141, 114]
2026-02-02T15:35:36.082828 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [80, 163, 141, 114, 16, 47, 14, 144, 181, 226, 230, 9, 183, 37, 161, 213]
2026-02-02T15:35:36.082828 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=12 ([0, 0, 0, 0, 12, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:36.082828 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065187257): [95, 246, 1, 216, 135, 227, 242, 112, 202, 241, 214, 253, 22, 206, 190, 195, 119, 150, 255, 228, 62, 54, 71, 23, 22, 221, 221, 41, 56, 34, 192, 64]
2026-02-02T15:35:36.082828 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=12, got 12 bytes
2026-02-02T15:35:36.082828 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:36.082828 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 1, 0, 0, 0, 0, 0, 3, 0, 0, 0, 33]
2026-02-02T15:35:36.082828 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:36.082828 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:36.082828 [FINER] [YamuxStream] [6][Server] StreamID=3 Received WINDOW_UPDATE from remote, delta: 33. Current our send window: 524255, New: 524288
2026-02-02T15:35:36.085176 [FINE] [Libp2pRouter] [DEBUG] Initializing Libp2pRouter...
2026-02-02T15:35:36.085680 [FINE] [Libp2pRouter] [DEBUG] Generating new Ed25519 identity
2026-02-02T15:35:36.092808 [FINE] [Libp2pRouter] [DEBUG] Libp2pRouter initialized with identity
2026-02-02T15:35:36.092808 [FINE] [Libp2pRouter] [DEBUG] Starting Libp2pRouter...
2026-02-02T15:35:36.092808 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:36.093726 [FINE] [ResourceManagerImpl] ResourceManager initialized.
2026-02-02T15:35:36.094616 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:36.094616 [FINE] [basichost] [BasicHost CONSTRUCTOR] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8 - Initial _network.listenAddresses: []
2026-02-02T15:35:36.094616 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8, Host hashCode: 700557086
2026-02-02T15:35:36.095628 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:36.095628 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:36.095628 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:36.095628 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8
2026-02-02T15:35:36.095628 [FINE] [identify] IdentifyService._startEventLoop: Starting event loop.
2026-02-02T15:35:36.095628 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=1, addrs=0, protocols=3
2026-02-02T15:35:36.096628 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:36.096628 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:36.096628 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:36.096628 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:36.096628 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:36.096628 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:36.096628 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:36.096628 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:36.096628 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:36.096628 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(8d7cd8eb) START. Requested: 2. Buffer: 30 bytes.
2026-02-02T15:35:36.096628 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(8d7cd8eb) END (from buffer). Returning 2 bytes: 001c. Buffer after: 28 bytes: 550cb2d9faea71d36c46c737567cbbadedc2932ec2c2db3998a975ed
2026-02-02T15:35:36.096628 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 2 bytes. First 4 bytes: [0, 28]
2026-02-02T15:35:36.097627 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 2, Got: 2
2026-02-02T15:35:36.097627 [FINER] [SecuredConnection] SecuredConnection: Length prefix bytes: [0, 28]
2026-02-02T15:35:36.097627 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Length Prefix) - Bytes: 001c
2026-02-02T15:35:36.097627 [FINER] [SecuredConnection] SecuredConnection: Got length prefix: 28
2026-02-02T15:35:36.097627 [FINER] [SecuredConnection] SecuredConnection: Reading combined data of length 28
2026-02-02T15:35:36.097627 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 28 more bytes (have 0/28)
2026-02-02T15:35:36.097627 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(eddabdd8) START. Requested: 28. Buffer: 28 bytes.
2026-02-02T15:35:36.097627 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(eddabdd8) END (from buffer). Returning 28 bytes: 550cb2d9faea71d36c46c737567cbbadedc2932ec2c2db3998a975ed. Buffer after: 0 bytes: 
2026-02-02T15:35:36.097627 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: received 28 bytes. First 4 bytes: [85, 12, 178, 217]
2026-02-02T15:35:36.097627 [FINER] [SecuredConnection] SecuredConnection: _readFullMessage completed after 1 attempts. Expected: 28, Got: 28
2026-02-02T15:35:36.097627 [FINER] [SecuredConnection] SecuredConnection: FROM_UNDERLYING_READ (Message Body) - Length: 28, Bytes: 550cb2d9faea71d36c46c737567cbbadedc2932ec2c2db3998a975ed
2026-02-02T15:35:36.097627 [FINER] [SecuredConnection] SecuredConnection: Got combined data of length 28
2026-02-02T15:35:36.097627 [FINER] [SecuredConnection] SecuredConnection: Split into encrypted(12) and MAC(16)
2026-02-02T15:35:36.097627 [FINER] [SecuredConnection] SecuredConnection:   Raw Received Ciphertext: 550cb2d9faea71d36c46c737
2026-02-02T15:35:36.097627 [FINER] [SecuredConnection] SecuredConnection:   Raw Received MAC: 567cbbadedc2932ec2c2db3998a975ed
2026-02-02T15:35:36.097627 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of encrypted: [85, 12, 178, 217]
2026-02-02T15:35:36.097627 [FINER] [SecuredConnection] SecuredConnection: First 4 bytes of MAC: [86, 124, 187, 173]
2026-02-02T15:35:36.097627 [FINER] [SecuredConnection] SecuredConnection: Full MAC: [86, 124, 187, 173, 237, 194, 147, 46, 194, 194, 219, 57, 152, 169, 117, 237]
2026-02-02T15:35:36.098627 [FINE] [SecuredConnection] SecuredConnection: 🔑 DECRYPTING with RECV NONCE=13 ([0, 0, 0, 0, 13, 0, 0, 0, 0, 0, 0, 0])
2026-02-02T15:35:36.098627 [FINER] [SecuredConnection] SecuredConnection: Using decryption key (hashCode: 1065187257): [95, 246, 1, 216, 135, 227, 242, 112, 202, 241, 214, 253, 22, 206, 190, 195, 119, 150, 255, 228, 62, 54, 71, 23, 22, 221, 221, 41, 56, 34, 192, 64]
2026-02-02T15:35:36.098627 [FINE] [SecuredConnection] SecuredConnection: ✅ DECRYPTION SUCCESS for RECV NONCE=13, got 12 bytes
2026-02-02T15:35:36.098627 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Added 12 bytes to _decryptedBuffer. New _decryptedBuffer.length: 12
2026-02-02T15:35:36.098627 [FINER] [SecuredConnection] SecuredConnection.read (length=12): Returning 12 bytes. Remaining _decryptedBuffer.length: 0. Data preview: [0, 0, 0, 4, 0, 0, 0, 3, 0, 0, 0, 0]
2026-02-02T15:35:36.098627 [FINE] [SecuredConnection] SecuredConnection.read: 🔓 RELEASING read lock for length=12
2026-02-02T15:35:36.098627 [FINE] [SecuredConnection] SecuredConnection: 🔓 Released read lock. Queue length: 0
2026-02-02T15:35:36.099628 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-HANDLE-DATA-OPT] Processing DATA frame, length: 0, flags: 4
2026-02-02T15:35:36.099628 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-FIN] Received FIN, transitioning to closing state
2026-02-02T15:35:36.099628 [FINE] [YamuxStream] [6][Server] StreamID=3 🔧 [YAMUX-STREAM-FIN] FIN received. localFinSent=false, queueSize=0
2026-02-02T15:35:36.100625 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 ACQUIRING read lock for length=12
2026-02-02T15:35:36.100625 [FINE] [SecuredConnection] SecuredConnection: 🔒 QUEUED for read lock. Queue length: 1, Lock held: false
2026-02-02T15:35:36.100625 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTING read lock to next waiter. Remaining queue: 0
2026-02-02T15:35:36.100625 [FINE] [SecuredConnection] SecuredConnection: 🔒 GRANTED read lock. Queue length: 0
2026-02-02T15:35:36.100625 [FINE] [SecuredConnection] SecuredConnection.read: 🔒 READ LOCK ACQUIRED for length=12
2026-02-02T15:35:36.100625 [FINER] [SecuredConnection] SecuredConnection.read: Called with length: 12, _decryptedBuffer.length: 0
2026-02-02T15:35:36.100625 [FINER] [SecuredConnection] SecuredConnection.read (length=12): _decryptedBuffer.length (0) < requested (12). Calling _readAndDecryptMessage().
2026-02-02T15:35:36.100625 [FINER] [SecuredConnection] SecuredConnection: Reading length prefix (2 bytes)
2026-02-02T15:35:36.100625 [FINE] [SecuredConnection] SecuredConnection: _readFullMessage attempt 1: need 2 more bytes (have 0/2)
2026-02-02T15:35:36.100625 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(ef6392d1) START. Requested: 2. Buffer: 0 bytes.
2026-02-02T15:35:36.100625 [FINER] [TCPConnection] TCPConnection(96206504-8e50-4ad2-8989-1c17e1ad5893) - Read(ef6392d1) ASYNC WAIT. Requested: 2. Buffer: 0
01:06 +940 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:06 +941 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:06 +942 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:06 +943 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:06 +944 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:06 +945 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage stop should handle multiple calls
01:07 +945 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:36.466496 [FINE] [ambient_autonat_v2] Probe generation 1 cancelled (current: 2)
2026-02-02T15:35:36.936581 [FINE] [basichost] Discovered 2 network interfaces
2026-02-02T15:35:36.937580 [FINER] [basichost] Processing interface: Wi-Fi
2026-02-02T15:35:36.938581 [FINER] [basichost] Discovered interface IP: 192.168.100.6 on Wi-Fi (InternetAddressType: IPv4)
2026-02-02T15:35:36.938581 [FINER] [basichost] Added interface address: /ip4/192.168.100.6
2026-02-02T15:35:36.938581 [FINER] [basichost] Processing interface: vEthernet (Default Switch)
2026-02-02T15:35:36.939582 [FINER] [basichost] Discovered interface IP: 172.29.112.1 on vEthernet (Default Switch) (InternetAddressType: IPv4)
2026-02-02T15:35:36.963637 [FINER] [basichost] Added interface address: /ip4/172.29.112.1
2026-02-02T15:35:36.966637 [FINE] [basichost] Interface discovery completed. Found 2 addresses
2026-02-02T15:35:36.974651 [FINE] [basichost] Local interface addresses updated. Filtered: 2, All: 2
2026-02-02T15:35:37.017756 [FINER] [basichost] Filtered interface addresses: [/ip4/192.168.100.6, /ip4/172.29.112.1]
2026-02-02T15:35:37.020755 [INFO] [basichost] Outbound capability changed: OutboundCapability.relayOnly -> OutboundCapability.ipv4Only
2026-02-02T15:35:37.025258 [INFO] [Config] [Config.newNode] for peer 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8: Host created. Listening will be handled by host.start().
2026-02-02T15:35:37.036825 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: []
2026-02-02T15:35:37.036825 [FINE] [basichost] [BasicHost start] BEGIN. Host ID: 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8, network.hashCode: 1064554308, initial network.listenAddresses: []
2026-02-02T15:35:37.037765 [FINE] [basichost] [BasicHost start] Initial _config.listenAddrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:35:37.037765 [FINE] [basichost] [BasicHost start] Configured with listenAddrs: [/ip4/0.0.0.0/tcp/0]. Attempting to listen via _network.listen().
2026-02-02T15:35:37.037765 [FINE] [basichost] [BasicHost start] INVOKING _network.listen() with: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:35:37.038269 [FINE] [Swarm] [Swarm listen] Called with addrs: [/ip4/0.0.0.0/tcp/0] for peer 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8
2026-02-02T15:35:37.038269 [FINE] [Swarm] Swarm.listen called with addrs: [/ip4/0.0.0.0/tcp/0]
2026-02-02T15:35:37.038269 [FINE] [Swarm] [Swarm listen] Processing address: /ip4/0.0.0.0/tcp/0 for peer 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8
2026-02-02T15:35:37.038269 [FINE] [Swarm] [Swarm listen] Attempting transport.listen() for /ip4/0.0.0.0/tcp/0 with transport TCPTransport for peer 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8
2026-02-02T15:35:37.038269 [FINE] [Swarm] Swarm.listen: Attempting to listen on /ip4/0.0.0.0/tcp/0 with transport TCPTransport
2026-02-02T15:35:37.057278 [FINE] [ambient_autonat_v2] Probe generation 1 cancelled (current: 2)
2026-02-02T15:35:37.058279 [FINE] [ambient_autonat_v2] Timeout waiting for scheduled probe to complete: TimeoutException after 0:00:05.000000: Future not completed
2026-02-02T15:35:37.058279 [INFO] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4602 closing. Stack trace:
#0      TCPListener.close (package:dart_libp2p/p2p/transport/tcp_listener.dart:83:91)
#1      Swarm.close.<anonymous closure> (package:dart_libp2p/p2p/network/swarm/swarm.dart:153:24)
#2      BasicLock.synchronized (package:synchronized/src/basic_lock.dart:36:24)
#3      Swarm.close (package:dart_libp2p/p2p/network/swarm/swarm.dart:145:23)
#4      BasicHost.close (package:dart_libp2p/p2p/host/basic/basic_host.dart:1432:20)
<asynchronous suspension>

2026-02-02T15:35:37.093126 [FINE] [Swarm] [Swarm listen] transport.listen() successful for /ip4/0.0.0.0/tcp/0. Listener: TCPListener, Listener.addr: /ip4/0.0.0.0/tcp/58654 for peer 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8
2026-02-02T15:35:37.093126 [FINE] [Swarm] Swarm.listen: transport.listen for /ip4/0.0.0.0/tcp/0 returned listener TCPListener with actual addr: /ip4/0.0.0.0/tcp/58654
2026-02-02T15:35:37.093126 [FINE] [Swarm] [Swarm listen] Added listener for /ip4/0.0.0.0/tcp/58654. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58654] for peer 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8
2026-02-02T15:35:37.093126 [FINE] [Swarm] Swarm.listen: Added listener. Current _listeners count: 1, _listenAddrs: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.093126 [WARNING] [Swarm] [Swarm listen] Skipping addition of unspecified listen address to peerstore: /ip4/0.0.0.0/tcp/58654 for peer 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8. This should be resolved to concrete addresses by the host.
2026-02-02T15:35:37.093126 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: false, _closed: false. Host: 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8
2026-02-02T15:35:37.093126 [FINE] [Swarm] Swarm._handleIncomingConnections called for listener: TCPListener on addr /ip4/0.0.0.0/tcp/58654
2026-02-02T15:35:37.093126 [FINE] [Swarm] [Swarm listen] listen() method finished for peer 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8.
2026-02-02T15:35:37.093126 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.094126 [FINE] [basichost] [BasicHost start] _network.listen() completed. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.094126 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.094126 [FINE] [basichost] [BasicHost start] Before _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.094126 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.094126 [FINE] [basichost] [BasicHost start] After _idService.start. Current network.listenAddresses: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.094126 [FINE] [basichost] Attempting to create and persist self signed peer record.
2026-02-02T15:35:37.094126 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.094126 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.094631 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58654 (first component not IP)
2026-02-02T15:35:37.094631 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:37.094631 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58654 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58654
2026-02-02T15:35:37.094631 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58654 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58654
2026-02-02T15:35:37.094631 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.094631 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58654 (first component not IP)
2026-02-02T15:35:37.094631 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:37.094631 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654}
2026-02-02T15:35:37.095634 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654}
2026-02-02T15:35:37.095634 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654}
2026-02-02T15:35:37.095634 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8 - Returning: [/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654]
2026-02-02T15:35:37.107177 [FINE] [basichost] Successfully created and persisted self signed peer record to peerstore.
2026-02-02T15:35:37.107177 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.107177 [FINE] [basichost] [BasicHost start] Before AutoNATv2 creation. network.hashCode: 1064554308, network.listenAddresses: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.109177 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:37.109177 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8, Host hashCode: 700557086
2026-02-02T15:35:37.109177 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.109177 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.110176 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58654 (first component not IP)
2026-02-02T15:35:37.110176 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:37.110176 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58654 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58654
2026-02-02T15:35:37.110176 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58654 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58654
2026-02-02T15:35:37.110176 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.110176 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58654 (first component not IP)
2026-02-02T15:35:37.110176 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:37.110176 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654}
2026-02-02T15:35:37.110176 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654}
2026-02-02T15:35:37.110176 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654}
2026-02-02T15:35:37.110176 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8 - Returning: [/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654]
2026-02-02T15:35:37.111175 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8
2026-02-02T15:35:37.111175 [FINE] [basichost] [BasicHost start] AutoNATv2 server started (providing service to other peers)
2026-02-02T15:35:37.111175 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:37.111175 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8, Host hashCode: 700557086
2026-02-02T15:35:37.111175 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.111175 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.111175 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58654 (first component not IP)
2026-02-02T15:35:37.111175 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:37.111175 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58654 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58654
2026-02-02T15:35:37.111175 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58654 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58654
2026-02-02T15:35:37.111175 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.112174 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58654 (first component not IP)
2026-02-02T15:35:37.112174 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:37.112174 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654}
2026-02-02T15:35:37.112174 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654}
2026-02-02T15:35:37.112174 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654}
2026-02-02T15:35:37.112679 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8 - Returning: [/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654]
2026-02-02T15:35:37.112679 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8
2026-02-02T15:35:37.112679 [FINE] [ambient_autonat_v2] AmbientAutoNATv2 initialized, scheduling first probe after boot delay (15s)
2026-02-02T15:35:37.113698 [FINE] [ambient_autonat_v2] Scheduling probe in 15s (force: false, status: Reachability.unknown, confidence: 0)
2026-02-02T15:35:37.113698 [FINE] [basichost] [BasicHost start] AmbientAutoNATv2 orchestrator created for ambient probing
2026-02-02T15:35:37.113698 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.113698 [FINE] [basichost] [BasicHost start] After AutoNATv2 creation. network.hashCode: 1064554308, network.listenAddresses: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.113698 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.113698 [FINE] [basichost] [BasicHost start] Before _holePunchService.start. network.hashCode: 1064554308, network.listenAddresses: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.113698 [FINE] [p2p-holepunch] Initializing holepunch service for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8
2026-02-02T15:35:37.113698 [FINER] [identify] IdentifyService._startEventLoop: Received event: EvtLocalProtocolsUpdated
2026-02-02T15:35:37.113698 [FINE] [identify] IdentifyService._updateSnapshot: Called. Querying host.addrs. Host: 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8, Host hashCode: 700557086
2026-02-02T15:35:37.115695 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.115695 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.115695 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58654 (first component not IP)
2026-02-02T15:35:37.115695 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:37.115695 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58654 with interface /ip4/192.168.100.6 to /ip4/192.168.100.6/tcp/58654
2026-02-02T15:35:37.115695 [FINER] [basichost] Resolved unspecified listen addr: /ip4/0.0.0.0/tcp/58654 with interface /ip4/172.29.112.1 to /ip4/172.29.112.1/tcp/58654
2026-02-02T15:35:37.115695 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.116696 [FINE] [identify.obsaddr] Not a thinwaist address: /ip4/0.0.0.0/tcp/58654 (first component not IP)
2026-02-02T15:35:37.116696 [FINER] [identify] IdentifyService.ownObservedAddrs: Returning 0 observed addresses.
2026-02-02T15:35:37.116696 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8 - resolvedAddrs: {/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654}
2026-02-02T15:35:37.116696 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8 - natAppliedAddrs: {/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654}
2026-02-02T15:35:37.116696 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8 - finalAddrs (before toList): {/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654}
2026-02-02T15:35:37.116696 [FINE] [basichost] [BasicHost allAddrs] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8 - Returning: [/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654]
2026-02-02T15:35:37.116696 [FINER] [identify] IdentifyService._updateSnapshot: host.addrs returned: [/ip4/192.168.100.6/tcp/58654, /ip4/172.29.112.1/tcp/58654] for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8
2026-02-02T15:35:37.117695 [FINE] [p2p-holepunch] Holepunch service initialized and ready for host 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8
2026-02-02T15:35:37.117695 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.117695 [FINE] [basichost] [BasicHost start] After _holePunchService.start. network.hashCode: 1064554308, network.listenAddresses: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.117695 [FINE] [basichost] HolePunch service started.
2026-02-02T15:35:37.117695 [FINE] [Swarm] Swarm.listenAddresses getter called. Returning: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.117695 [FINE] [basichost] [BasicHost start] Before calling _startBackground. network.hashCode: 1064554308, network.listenAddresses: [/ip4/0.0.0.0/tcp/58654]
2026-02-02T15:35:37.117695 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=2, addrs=2, protocols=5
2026-02-02T15:35:37.117695 [FINE] [identify] IdentifyService._startEventLoop: Snapshot updated, triggering push.
2026-02-02T15:35:37.117695 [INFO] [Libp2pRouter] [INFO] Libp2pRouter started on /ip4/0.0.0.0/tcp/0 with ID: 12D3KooWMRf9D7XReN3FeDdoDV2ehsYFtqGajkv1KTKvF7JgE6S8
2026-02-02T15:35:37.118695 [FINE] [identify] IdentifyService._startEventLoop: Push trigger received, calling _sendPushes.
2026-02-02T15:35:37.118695 [FINE] [Libp2pRouter] [DEBUG] Stopping Libp2pRouter...
2026-02-02T15:35:37.118695 [FINE] [identify] IdentifyService.close: Closing identify service.
2026-02-02T15:35:37.118695 [FINE] [identify] IdentifyService.close: Shutdown signal set, stopping new PUSH operations.
2026-02-02T15:35:37.118695 [FINE] [identify] IdentifyService.close: Found 0 active PUSH operations to wait for.
2026-02-02T15:35:37.119694 [FINER] [identify] IdentifyService.close: Closing ObservedAddrManager and NATEmitter.
2026-02-02T15:35:37.119694 [INFO] [Libp2pRouter] [INFO] Libp2pRouter stopped
2026-02-02T15:35:37.119694 [WARNING] [Libp2pRouter] [WARNING] Libp2pRouter already stopped
2026-02-02T15:35:37.119694 [FINER] [identify] IdentifyService._updateSnapshot: New snapshot is identical to current one. No update.
2026-02-02T15:35:37.119694 [FINER] [identify] IdentifyService._startEventLoop: Snapshot not updated, not triggering push.
01:07 +946 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:37.120694 [FINE] [identify] IdentifyService._updateSnapshot: Snapshot updated. New seq=3, addrs=2, protocols=6
01:07 +946 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage receiveMessages should return same stream
01:07 +946 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:37.121695 [FINE] [identify] IdentifyService.close: Closed event bus subscription.
2026-02-02T15:35:37.121695 [FINE] [identify] IdentifyService.close: Closed triggerPush StreamController.
2026-02-02T15:35:37.133228 [FINER] [identify] IdentifyService.close: Completing _closedCompleter.
2026-02-02T15:35:37.133228 [FINE] [identify] IdentifyService.close: Identify service closed.
2026-02-02T15:35:37.133228 [FINE] [ambient_autonat_v2] Closing AmbientAutoNATv2
2026-02-02T15:35:37.152278 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4602: ServerSocket closed.
2026-02-02T15:35:37.152278 [FINE] [Swarm] Listener /ip4/0.0.0.0/tcp/4602 connectionStream is done. Removing listener.
2026-02-02T15:35:37.152278 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4602 already closed.
2026-02-02T15:35:37.152278 [FINE] [TCPListener] TCPListener for /ip4/0.0.0.0/tcp/4602: ConnectionController closed.
2026-02-02T15:35:37.153782 [FINE] [basichost] [BasicHost signalAddressChange] Called. _addrChangeChan.isClosed: true, _closed: true. Host: 12D3KooWPwpJGLMpFW1ncHKwki3JGqadb9YoyRyoyBBLbZuzazP2
2026-02-02T15:35:37.153782 [FINE] [ambient_autonat_v2] Probe generation 1 cancelled (current: 2)
01:07 +947 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage event methods management
01:07 +948 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage parseMultiaddr and resolvePeerId
01:07 +948 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:37.166813 [WARNING] [Libp2pRouter] [WARNING] Failed to parse multiaddr: invalid
01:07 +949 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage methods should throw if not started
01:07 +950 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage protocol management
01:07 +950 -4: test\transport\libp2p_router_coverage_test.dart: Libp2pRouter Coverage initialize should handle seed
2026-02-02T15:35:37.171316 [FINE] [Libp2pRouter] [DEBUG] Registered protocol handler for /p
2026-02-02T15:35:37.172380 [FINE] [Libp2pRouter] [DEBUG] Removed protocol handler for /p
2026-02-02T15:35:37.172380 [FINE] [Libp2pRouter] [DEBUG] Registered protocol /new
01:08 +951 -4: test\utils\car_test.dart: CAR Format CAR.v2WithIndex creates valid archive
01:08 +952 -4: test\utils\car_test.dart: CAR Format CAR serialization produces bytes
01:08 +953 -4: test\utils\car_test.dart: CAR Format CAR deserialization restores structure
01:08 +954 -4: test\utils\car_test.dart: CAR Format CAR version is 2 by default
01:08 +955 -4: test\utils\car_test.dart: CarHeader CarHeader stores version
01:08 +956 -4: test\utils\car_test.dart: CarHeader CarHeader stores characteristics
01:08 +957 -4: test\utils\car_test.dart: CarHeader CarHeader stores roots
01:08 +958 -4: test\utils\car_test.dart: CarIndex CarIndex.generate creates index from blocks
01:08 +959 -4: test\utils\car_test.dart: CarIndex CarIndex.addEntry stores offset and length
01:08 +960 -4: test\utils\car_test.dart: CarIndex CarIndex returns null for unknown CID
01:08 +961 -4: test\utils\car_test.dart: CAR Selective Loading loadSelected throws without index
01:08 +962 -4: test\utils\car_test.dart: CAR Selective Loading getBlockOffset uses index
01:08 +963 -4: test\utils\dnslink_resolver_test.dart: DNSLinkResolver URL Construction URL is correctly formatted
01:08 +964 -4: test\utils\dnslink_resolver_test.dart: DNSLinkResolver URL Construction handles subdomains correctly
01:08 +965 -4: test\utils\dnslink_resolver_test.dart: DNSLinkResolver Response Parsing extracts CID from successful response
01:08 +966 -4: test\utils\dnslink_resolver_test.dart: DNSLinkResolver Response Parsing returns null for missing CID in response
01:08 +967 -4: test\utils\dnslink_resolver_test.dart: DNSLinkResolver Error Handling returns null on HTTP error (non-200)
01:08 +968 -4: test\utils\encoding_test.dart: EncodingUtils toBase58 and fromBase58 roundtrip
01:08 +969 -4: test\utils\encoding_test.dart: EncodingUtils toBase58 and fromBase58 roundtrip
01:08 +970 -4: test\utils\encoding_test.dart: EncodingUtils toBase58 and fromBase58 roundtrip
01:08 +971 -4: test\utils\encoding_test.dart: EncodingUtils toBase58 and fromBase58 roundtrip
01:08 +972 -4: test\utils\encoding_test.dart: EncodingUtils toBase58 and fromBase58 roundtrip
01:08 +973 -4: test\utils\encoding_test.dart: EncodingUtils fromBase58 empty string throws
01:08 +974 -4: test\utils\encoding_test.dart: EncodingUtils fromBase58 invalid prefix throws
01:08 +975 -4: test\utils\encoding_test.dart: EncodingUtils fromBase58 unsupported encoding throws
01:08 +976 -4: test\utils\encoding_test.dart: EncodingUtils isValidCIDBytes - CIDv0
01:08 +977 -4: test\utils\encoding_test.dart: EncodingUtils isValidCIDBytes - CIDv1
01:09 +978 -4: test\utils\encoding_test.dart: EncodingUtils isValidCIDBytes - invalid bytes
01:09 +979 -4: test\utils\encoding_test.dart: EncodingUtils indexToCidVersion
01:09 +980 -4: test\utils\encoding_test.dart: EncodingUtils isValidMultibasePrefix
01:09 +981 -4: test\utils\encoding_test.dart: EncodingUtils getEncodingFromPrefix
01:09 +982 -4: test\utils\encoding_test.dart: EncodingUtils codec conversion
01:09 +983 -4: test\utils\encoding_test.dart: EncodingUtils supportedCodecs list
01:09 +984 -4: test\utils\encoding_test.dart: EncodingUtils cidToBytes
01:09 +985 -4: test\utils\encoding_utils_test.dart: EncodingUtils Base58 toBase58 encodes correctly with z prefix
01:09 +986 -4: test\utils\encoding_utils_test.dart: EncodingUtils Base58 fromBase58 throws on empty string
01:09 +987 -4: test\utils\encoding_utils_test.dart: EncodingUtils Base58 fromBase58 throws on invalid prefix
01:09 +988 -4: test\utils\encoding_utils_test.dart: EncodingUtils Base58 fromBase58 throws on unsupported supported prefix
01:09 +989 -4: test\utils\generate_message_id_test.dart: MessageId Generator generateMessageId returns non-empty string
01:09 +990 -4: test\utils\generate_message_id_test.dart: MessageId Generator generateMessageId returns non-empty string
01:09 +991 -4: test\utils\generate_message_id_test.dart: MessageId Generator generateMessageId returns non-empty string
01:09 +992 -4: test\utils\generate_message_id_test.dart: MessageId Generator generateMessageId returns non-empty string
01:09 +993 -4: test\utils\generate_message_id_test.dart: MessageId Generator generateMessageId returns non-empty string
01:09 +994 -4: test\utils\generate_message_id_test.dart: MessageId Generator generateMessageId returns non-empty string
01:09 +995 -4: test\utils\generate_message_id_test.dart: MessageId Generator generateMessageId returns non-empty string
01:09 +996 -4: test\utils\encoding_utils_test.dart: EncodingUtils Codecs supportedCodecs list is not empty
01:09 +997 -4: test\utils\generate_message_id_test.dart: MessageId Generator generateMessageId returns unique IDs
01:09 +998 -4: test\utils\generate_message_id_test.dart: MessageId Generator generateMessageId returns unique IDs
01:09 +999 -4: test\utils\encoding_utils_test.dart: EncodingUtils Multibase getEncodingFromPrefix returns correct encoding name
01:09 +1000 -4: test\utils\generate_message_id_test.dart: MessageId Generator generateMessageId returns UUID v4 format
01:09 +1001 -4: test\utils\generate_message_id_test.dart: MessageId Generator multiple calls generate different IDs
01:09 +1002 -4: test\utils\keystore_test.dart: Keystore add and get key pair
2026-02-02T15:35:38.919286 [INFO] [Keystore] [INFO] Added key pair for test.
01:09 +1003 -4: test\utils\keystore_test.dart: Keystore add and get key pair
01:09 +1004 -4: test\utils\keystore_test.dart: Keystore add and get key pair
01:09 +1005 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache basic operations updates existing values
01:09 +1006 -4: test\utils\keystore_test.dart: Keystore getKeyPair throws if not found
01:09 +1007 -4: test\utils\keystore_test.dart: Keystore getKeyPair throws if not found
01:09 +1008 -4: test\utils\keystore_test.dart: Keystore getKeyPair throws if not found
01:09 +1009 -4: test\utils\keystore_test.dart: Keystore getKeyPair throws if not found
01:09 +1010 -4: test\utils\keystore_test.dart: Keystore getKeyPair throws if not found
01:09 +1011 -4: test\utils\keystore_test.dart: Keystore getKeyPair throws if not found
01:09 +1012 -4: test\utils\keystore_test.dart: Keystore getKeyPair throws if not found
01:09 +1013 -4: test\utils\keystore_test.dart: Keystore getKeyPair throws if not found
01:09 +1014 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache clear calls onEvict for all entries
01:09 +1015 -4: test\utils\keystore_test.dart: Keystore remove key pair
01:09 +1015 -4: test\utils\keystore_test.dart: Keystore add and get key pair
2026-02-02T15:35:38.961227 [INFO] [Keystore] [INFO] Added key pair for test.
2026-02-02T15:35:38.962328 [INFO] [Keystore] [INFO] Removed key pair for test.
01:09 +1016 -4: test\utils\keystore_test.dart: Keystore remove key pair
01:09 +1017 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache getOrCompute computes and caches if missing
01:09 +1018 -4: test\utils\keystore_test.dart: Keystore remove non-existent key pair (warning path)
01:09 +1018 -4: test\utils\keystore_test.dart: Keystore add and get key pair
2026-02-02T15:35:38.965810 [WARNING] [Keystore] [WARNING] No key pair found for missing to remove.
01:09 +1019 -4: test\utils\generic_lru_cache_test.dart: GenericLRUCache containsKey returns true for existing keys
01:09 +1020 -4: test\utils\keystore_test.dart: Keystore listKeyPairs
01:09 +1020 -4: test\utils\keystore_test.dart: Keystore add and get key pair
2026-02-02T15:35:38.968004 [INFO] [Keystore] [INFO] Added key pair for k1.
2026-02-02T15:35:38.968004 [INFO] [Keystore] [INFO] Added key pair for k2.
01:09 +1021 -4: test\utils\generic_lru_cache_test.dart: TimedLRUCache expires entries after TTL
01:09 +1021 -4: test\utils\keystore_test.dart: Keystore add and get key pair
2026-02-02T15:35:38.977560 [INFO] [Keystore] [INFO] Added key pair for k1.
2026-02-02T15:35:38.989681 [INFO] [Keystore] [INFO] Added key pair for k1.
2026-02-02T15:35:38.990187 [INFO] [Keystore] [INFO] Keystore deserialized from JSON.
01:09 +1022 -4: test\utils\generic_lru_cache_test.dart: TimedLRUCache expires entries after TTL
01:09 +1023 -4: test\utils\generic_lru_cache_test.dart: TimedLRUCache expires entries after TTL
01:09 +1023 -4: test\utils\keystore_test.dart: Keystore add and get key pair
2026-02-02T15:35:39.001514 [INFO] [Keystore] [INFO] Added key pair for self.
01:09 +1024 -4: test\utils\generic_lru_cache_test.dart: TimedLRUCache expires entries after TTL
01:09 +1025 -4: test\utils\keystore_test.dart: Keystore verifySignature - simple hex pubkey
01:09 +1026 -4: test\utils\keystore_test.dart: Keystore verifySignature - simple hex pubkey
01:09 +1027 -4: test\utils\keystore_test.dart: Keystore verifySignature - base64 pubkey
01:09 +1028 -4: test\utils\keystore_test.dart: Keystore verifySignature - raw string fallback
01:09 +1028 -4: test\utils\keystore_test.dart: Keystore add and get key pair
2026-02-02T15:35:39.199433 [WARNING] [Keystore] [WARNING] Invalid key format for verification: Algorithm ed25519 expects a public key with 32 bytes, but got: 9 bytes
01:09 +1029 -4: test\utils\keystore_test.dart: Keystore exportKeysForMigration and clearAfterMigration
01:09 +1029 -4: test\utils\keystore_test.dart: Keystore add and get key pair
2026-02-02T15:35:39.201433 [INFO] [Keystore] [INFO] Added key pair for k1.
2026-02-02T15:35:39.201433 [INFO] [Keystore] [INFO] Added key pair for k2.
2026-02-02T15:35:39.202938 [WARNING] [Keystore] [WARNING] Exporting plaintext keys for migration - ensure they are encrypted!
2026-02-02T15:35:39.203957 [INFO] [Keystore] [INFO] Plaintext keystore cleared after migration
01:10 +1030 -4: test\utils\logger_test.dart: Logger Log Levels debug level maps correctly
01:10 +1031 -4: test\utils\logger_test.dart: Logger Log Levels info level maps correctly
01:10 +1032 -4: test\utils\logger_test.dart: Logger Log Levels warning level maps correctly
01:10 +1033 -4: test\utils\logger_test.dart: Logger Log Levels error level maps correctly
01:10 +1034 -4: test\utils\logger_test.dart: Logger Log Levels invalid level would throw
01:10 +1035 -4: test\utils\logger_test.dart: Logger Message Formatting debug prefix is [DEBUG]
01:10 +1036 -4: test\utils\logger_test.dart: Logger Message Formatting info prefix is [INFO]
01:10 +1037 -4: test\utils\logger_test.dart: Logger Message Formatting warning prefix is [WARNING]
01:10 +1038 -4: test\utils\logger_test.dart: Logger Message Formatting error prefix is [ERROR]
01:10 +1039 -4: test\utils\logger_test.dart: Logger Message Formatting verbose prefix is [VERBOSE]
01:10 +1040 -4: test\utils\logger_test.dart: Logger Debug/Verbose Flags debug disabled by default
01:10 +1041 -4: test\utils\logger_test.dart: Logger Debug/Verbose Flags verbose disabled by default
01:10 +1042 -4: test\utils\logger_test.dart: Logger Debug/Verbose Flags debug messages only logged when enabled
01:10 +1043 -4: test\utils\logger_test.dart: Logger Timestamp Format uses ISO8601 format
01:10 +1044 -4: test\utils\logger_test.dart: Logger File Output log file name is ipfs.log
01:10 +1045 -4: test\utils\logger_test.dart: Logger File Output stringToBytes converts correctly
01:10 +1046 -4: test\utils\logger_test.dart: Logger Hierarchical Logging supports component names
01:10 +1047 -4: test\utils\message_id_verified_test.dart: Message ID Generation - Verified Tests generateMessageId returns non-empty string
01:10 +1048 -4: test\utils\message_id_verified_test.dart: Message ID Generation - Verified Tests generateMessageId creates unique IDs
01:10 +1049 -4: test\utils\message_id_verified_test.dart: Message ID Generation - Verified Tests generateMessageId format is consistent
01:10 +1050 -4: test\utils\message_id_verified_test.dart: Message ID Generation - Verified Tests concurrent ID generation produces unique IDs
01:10 +1051 -4: test\utils\message_id_verified_test.dart: Message ID Generation - Verified Tests IDs remain unique across batches
01:10 +1052 -4: test\utils\private_key_test.dart: IPFSPrivateKey generate and sign/verify roundtrip
01:10 +1053 -4: test\utils\private_key_test.dart: IPFSPrivateKey generate and sign/verify roundtrip
01:10 +1054 -4: test\utils\private_key_test.dart: IPFSPrivateKey generate and sign/verify roundtrip
01:10 +1055 -4: test\utils\private_key_test.dart: IPFSPrivateKey generate and sign/verify roundtrip
01:10 +1056 -4: test\utils\private_key_test.dart: IPFSPrivateKey generate and sign/verify roundtrip
01:10 +1057 -4: test\utils\private_key_test.dart: IPFSPrivateKey fromString and sign/verify
01:11 +1058 -4: test\utils\private_key_test.dart: IPFSPrivateKey fromBytes - ECDSA
01:11 +1059 -4: test\utils\private_key_test.dart: IPFSPrivateKey fromBytes - Unsupported algorithm
01:11 +1060 -4: test\utils\private_key_test.dart: IPFSPrivateKey signature verification failure on wrong data
01:11 +1061 -4: test\utils\private_key_test.dart: IPFSPrivateKey publicKeyBytes for non-ECDSA (theoretical)
01:11 +1062 -4: test\web\ipfs_web_node_test.dart: IPFSWebNode should start and set running state
2026-02-02T15:35:40.382296 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:35:40.389857 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:35:40.389857 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:35:40.389857 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:35:40.389857 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:35:40.393417 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:35:40.395927 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:40.397439 [FINE] [BitswapHandler] [DEBUG] Starting BitswapHandler...
2026-02-02T15:35:40.397439 [FINE] [BitswapHandler] [VERBOSE] Router initialized
2026-02-02T15:35:40.397439 [FINE] [BitswapHandler] [VERBOSE] Router started
2026-02-02T15:35:40.398459 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:35:40.398459 [INFO] [BitswapHandler] [INFO] BitswapHandler started successfully
2026-02-02T15:35:40.399538 [INFO] [PubSubClient] [INFO] PubSub client started with peer ID: QmUNLLsPACCz1vLxQVkXqqLX5R1X345qqfHbsf67hvA3Nn
2026-02-02T15:35:40.405749 [INFO] [PubSubClient] [INFO] PubSub client stopped.
01:11 +1063 -4: test\web\ipfs_web_node_test.dart: IPFSWebNode should add and retrieve content
01:11 +1063 -4: test\web\ipfs_web_node_test.dart: IPFSWebNode should start and set running state
2026-02-02T15:35:40.419488 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:35:40.419488 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:35:40.420592 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:35:40.421593 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:35:40.421593 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:35:40.421593 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:35:40.421593 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:40.421593 [FINE] [BitswapHandler] [DEBUG] Starting BitswapHandler...
2026-02-02T15:35:40.422731 [FINE] [BitswapHandler] [VERBOSE] Router initialized
2026-02-02T15:35:40.422731 [FINE] [BitswapHandler] [VERBOSE] Router started
2026-02-02T15:35:40.422731 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:35:40.422731 [INFO] [BitswapHandler] [INFO] BitswapHandler started successfully
2026-02-02T15:35:40.423949 [INFO] [PubSubClient] [INFO] PubSub client started with peer ID: QmUNLLsPACCz1vLxQVkXqqLX5R1X345qqfHbsf67hvA3Nn
2026-02-02T15:35:40.495842 [INFO] [PubSubClient] [INFO] PubSub client stopped.
01:11 +1064 -4: test\web\ipfs_web_node_test.dart: IPFSWebNode should handle pinning
01:11 +1064 -4: test\web\ipfs_web_node_test.dart: IPFSWebNode should start and set running state
2026-02-02T15:35:40.501003 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:35:40.501509 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:35:40.501509 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:35:40.501509 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:35:40.502609 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:35:40.502609 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:35:40.502609 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:40.502609 [FINE] [BitswapHandler] [DEBUG] Starting BitswapHandler...
2026-02-02T15:35:40.502609 [FINE] [BitswapHandler] [VERBOSE] Router initialized
2026-02-02T15:35:40.502609 [FINE] [BitswapHandler] [VERBOSE] Router started
2026-02-02T15:35:40.504113 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:35:40.504113 [INFO] [BitswapHandler] [INFO] BitswapHandler started successfully
2026-02-02T15:35:40.504113 [INFO] [PubSubClient] [INFO] PubSub client started with peer ID: QmUNLLsPACCz1vLxQVkXqqLX5R1X345qqfHbsf67hvA3Nn
2026-02-02T15:35:40.542790 [INFO] [PubSubClient] [INFO] PubSub client stopped.
01:11 +1065 -4: test\web\ipfs_web_node_test.dart: IPFSWebNode should addStream and retrieve content
01:11 +1065 -4: test\web\ipfs_web_node_test.dart: IPFSWebNode should start and set running state
2026-02-02T15:35:40.547895 [INFO] [BitswapHandler] [INFO] Initializing BitswapHandler
2026-02-02T15:35:40.547895 [FINE] [BitswapHandler] [DEBUG] Setting up Bitswap protocol handlers
2026-02-02T15:35:40.547895 [FINE] [BitswapHandler] [DEBUG] Registered protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:35:40.548900 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:35:40.548900 [INFO] [BitswapHandler] [INFO] Bitswap protocol handlers initialized
2026-02-02T15:35:40.548900 [FINE] [MetricsCollector] [DEBUG] MetricsCollector instance created
2026-02-02T15:35:40.548900 [FINE] [IPNSHandler] [DEBUG] IPNSHandler instance created
2026-02-02T15:35:40.548900 [FINE] [BitswapHandler] [DEBUG] Starting BitswapHandler...
2026-02-02T15:35:40.549899 [FINE] [BitswapHandler] [VERBOSE] Router initialized
2026-02-02T15:35:40.549899 [FINE] [BitswapHandler] [VERBOSE] Router started
2026-02-02T15:35:40.549899 [FINE] [BitswapHandler] [DEBUG] Added message handler for protocol: /ipfs/bitswap/1.2.0
2026-02-02T15:35:40.549899 [INFO] [BitswapHandler] [INFO] BitswapHandler started successfully
2026-02-02T15:35:40.550899 [INFO] [PubSubClient] [INFO] PubSub client started with peer ID: QmUNLLsPACCz1vLxQVkXqqLX5R1X345qqfHbsf67hvA3Nn
2026-02-02T15:35:40.601927 [INFO] [PubSubClient] [INFO] PubSub client stopped.
01:11 +1066 -4: Some tests failed.

Consider enabling the flag chain-stack-traces to receive more detailed exceptions.
For example, 'dart test --chain-stack-traces'.
