* STATE: INIT => CONNECT handle 0x600057450; line 1103 (connection #-5000) * Added connection 0. The cache now contains 1 members * Trying 23.206.182.148... * STATE: CONNECT => WAITCONNECT handle 0x600057450; line 1156 (connection #0) % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to implementation.concursolutions.com (23.206.182.148) port 443 (#0) * STATE: WAITCONNECT => SENDPROTOCONNECT handle 0x600057450; line 1253 (connection #0) * ALPN, offering h2 * ALPN, offering http/1.1 * Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH * successfully set certificate verify locations: * CAfile: /etc/pki/tls/certs/ca-bundle.crt CApath: none * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.2 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * STATE: SENDPROTOCONNECT => PROTOCONNECT handle 0x600057450; line 1267 (connection #0) { [5 bytes data] * TLSv1.2 (IN), TLS handshake, Server hello (2): { [102 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate (11): { [3799 bytes data] * TLSv1.2 (IN), TLS handshake, Server key exchange (12): { [333 bytes data] * TLSv1.2 (IN), TLS handshake, Server finished (14): { [4 bytes data] * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): } [70 bytes data] * TLSv1.2 (OUT), TLS change cipher, Client hello (1): } [1 bytes data] * TLSv1.2 (OUT), TLS handshake, Finished (20): } [16 bytes data] * TLSv1.2 (IN), TLS change cipher, Client hello (1): { [1 bytes data] * TLSv1.2 (IN), TLS handshake, Finished (20): { [16 bytes data] * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: C=US; ST=WA; L=Redmond; O=Concur Technologies, Inc.; OU=Operations; CN=*.concursolutions.com * start date: May 15 17:52:50 2015 GMT * expire date: May 15 17:52:49 2016 GMT * subjectAltName: implementation.concursolutions.com matched * issuer: C=NL; L=Amsterdam; O=Verizon Enterprise Solutions; OU=Cybertrust; CN=Verizon Akamai SureServer CA G14-SHA2 * SSL certificate verify ok. * STATE: PROTOCONNECT => DO handle 0x600057450; line 1288 (connection #0) * Using HTTP2, server supports multi-use * Connection state changed (HTTP/2 confirmed) * TCP_NODELAY set * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * nghttp2_session_mem_recv() returns 0 } [5 bytes data] * http2_send len=243 * Failed sending HTTP request * Curl_done * free header_recvbuf!! 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 * Connection #0 to host implementation.concursolutions.com left intact * multi changed, check CONNECT_PEND queue! * Expire cleared curl: (55) Failed sending HTTP request