CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = api.prd.rococo.weshow.co.jp i:C = US, O = Let's Encrypt, CN = E7 a:PKEY: id-ecPublicKey, 256 (bit); sigalg: ecdsa-with-SHA384 v:NotBefore: Nov 14 06:39:18 2025 GMT; NotAfter: Feb 12 06:39:17 2026 GMT 1 s:C = US, O = Let's Encrypt, CN = E7 i:C = US, O = Internet Security Research Group, CN = ISRG Root X1 a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDojCCAymgAwIBAgISBS+efrqPok2bspvoqStkbceaMAoGCCqGSM49BAMDMDIx CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF NzAeFw0yNTExMTQwNjM5MThaFw0yNjAyMTIwNjM5MTdaMCYxJDAiBgNVBAMTG2Fw aS5wcmQucm9jb2NvLndlc2hvdy5jby5qcDBZMBMGByqGSM49AgEGCCqGSM49AwEH A0IABIjH0ZLvmfaSragfU8eeMn0fWYRIbbZrZsI6vzOXc1pPL+R2U3VV9DKS3ZNE /H/XE8OhR9KQZDPUttT5xqPr22yjggIpMIICJTAOBgNVHQ8BAf8EBAMCB4AwHQYD VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O BBYEFCEPPB60ppqqgNMVcDqAQBsOv7gmMB8GA1UdIwQYMBaAFK5IntyHHUSgb9qi 5WB0BHjCnACAMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAoYWaHR0cDovL2U3 LmkubGVuY3Iub3JnLzAmBgNVHREEHzAdghthcGkucHJkLnJvY29jby53ZXNob3cu Y28uanAwEwYDVR0gBAwwCjAIBgZngQwBAgEwLQYDVR0fBCYwJDAioCCgHoYcaHR0 cDovL2U3LmMubGVuY3Iub3JnLzI3LmNybDCCAQQGCisGAQQB1nkCBAIEgfUEgfIA 8AB2AEmcm2neHXzs/DbezYdkprhbrwqHgBnRVVL76esp3fjDAAABmoFMidUAAAQD AEcwRQIgByzw9ts6TKnfacgjws7QCf6JTOGwm+kpSIkoVJF+TUwCIQCH7T5Xu5Nw LhKm1NYNQjmxKwJ6MRVFLp4vf0sAbvKFOgB2AA5XlLzzrqk+MxssmQez95Dfm8I9 cTIl3SGpJaxhxU4hAAABmoFMicsAAAQDAEcwRQIhAMHXeRKaG7b+mJdNudRfhRh7 AclhsrSZuYt2sXDlOBnKAiBIr/SrU/5CIQKZspXANT+4A7JmzGV2ui3iaiv0zNsG fjAKBggqhkjOPQQDAwNnADBkAjB4A4uC7dARZbbX8XsIdgT6t2lXjvaHqJeIoQwR Dy4nH0UOmJ+wxAe0YrNWn0XHF28CMEGOv9j73yOF8sZAh+wtQiEiwty80pGS+5cX X9xtnbYY41K4rNr0jDVmuxXr93iE7g== -----END CERTIFICATE----- subject=CN = api.prd.rococo.weshow.co.jp issuer=C = US, O = Let's Encrypt, CN = E7 --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 2408 bytes and written 402 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 256 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: 9BB0F2A1003A426D2741FAF05C3CC8B706FAD755BAE79E07EFD54581FD5E2DF9 Session-ID-ctx: Resumption PSK: 111F4516EB23B02F3231AF1BDBBC0904E04EBD0298EF617054575324B4803476 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - f0 0a ff 0a c3 24 56 1e-a8 15 fd ad d3 bd f8 1d .....$V......... 0010 - e2 af c5 73 63 5e c6 0c-f2 79 68 5b 13 83 fb a9 ...sc^...yh[.... 0020 - 15 15 d5 cc 8a d9 b4 7b-3d c9 1b 59 32 70 cb 77 .......{=..Y2p.w 0030 - bf 9c 15 b2 a4 a6 35 0f-c1 0e 3e 1e 34 4b 7d 7d ......5...>.4K}} 0040 - 57 80 04 1b 18 67 39 dc-c6 0f eb 2d a8 07 69 08 W....g9....-..i. 0050 - 02 c0 01 bb 8b 3e 87 8e-28 3c af bb 2a df 78 95 .....>..(<..*.x. 0060 - 5e 18 b8 01 72 39 c7 e9-d0 b9 6f a9 5f 5c 24 3d ^...r9....o._\$= 0070 - 51 Q Start Time: 1767235804 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK