# server TLSv1.3 TLS13-CHACHA20-POLY1305-SHA256 -v 4 -l TLS13-CHACHA20-POLY1305-SHA256 # client TLSv1.3 TLS13-CHACHA20-POLY1305-SHA256 -v 4 -l TLS13-CHACHA20-POLY1305-SHA256 # server TLSv1.3 TLS13-AES128-GCM-SHA256 -v 4 -l TLS13-AES128-GCM-SHA256 -6 # client TLSv1.3 TLS13-AES128-GCM-SHA256 -v 4 -l TLS13-AES128-GCM-SHA256 -6 # server TLSv1.3 TLS13-AES256-GCM-SHA384 -v 4 -l TLS13-AES256-GCM-SHA384 # client TLSv1.3 TLS13-AES256-GCM-SHA384 -v 4 -l TLS13-AES256-GCM-SHA384 # server TLSv1.3 TLS13-AES128-CCM-SHA256 -v 4 -l TLS13-AES128-CCM-SHA256 # client TLSv1.3 TLS13-AES128-CCM-SHA256 -v 4 -l TLS13-AES128-CCM-SHA256 # server TLSv1.3 TLS13-AES128-CCM-8-SHA256 -v 4 -l TLS13-AES128-CCM-8-SHA256 # client TLSv1.3 TLS13-AES128-CCM-8-SHA256 -v 4 -l TLS13-AES128-CCM-8-SHA256 # server TLSv1.3 TLS13-AES128-CCM8-SHA256 (OpenSSL-compat alias) -v 4 -l TLS13-AES128-CCM8-SHA256 # client TLSv1.3 TLS13-AES128-CCM8-SHA256 (OpenSSL-compat alias) -v 4 -l TLS13-AES128-CCM8-SHA256 # server TLSv1.3 resumption -v 4 -l TLS13-AES128-GCM-SHA256 -r # client TLSv1.3 resumption -v 4 -l TLS13-AES128-GCM-SHA256 -r # server TLSv1.3 resumption - SHA384 -v 4 -l TLS13-AES256-GCM-SHA384 -r # client TLSv1.3 resumption - SHA384 -v 4 -l TLS13-AES256-GCM-SHA384 -r # server TLSv1.3 PSK without (EC)DHE -v 4 -l TLS13-AES128-GCM-SHA256 -r # client TLSv1.3 PSK without (EC)DHE -v 4 -l TLS13-AES128-GCM-SHA256 -r -K # server TLSv1.3 accepting EarlyData -v 4 -l TLS13-AES128-GCM-SHA256 -r -0 # client TLSv1.3 sending EarlyData -v 4 -l TLS13-AES128-GCM-SHA256 -r -0 # server TLSv1.3 not accepting EarlyData -v 4 -l TLS13-AES128-GCM-SHA256 -r # client TLSv1.3 sending EarlyData -v 4 -l TLS13-AES128-GCM-SHA256 -r -0 # server TLSv1.3 accepting EarlyData -v 4 -l TLS13-AES128-GCM-SHA256 -r -0 # client TLSv1.3 not sending EarlyData -v 4 -l TLS13-AES128-GCM-SHA256 -r # server TLSv1.3 -v 4 -l TLS13-AES128-GCM-SHA256 # client TLSv1.3 Fragments -v 4 -l TLS13-AES128-GCM-SHA256 -F 1 # server TLSv1.3 -v 4 -l TLS13-AES128-GCM-SHA256 # client TLSv1.3 HelloRetryRequest to negotiate Key Exchange algorithm -v 4 -l TLS13-AES128-GCM-SHA256 -J # server TLSv1.3 -v 4 -l TLS13-AES128-GCM-SHA256 -J # client TLSv1.3 HelloRetryRequest with cookie -v 4 -l TLS13-AES128-GCM-SHA256 -J # server TLSv1.3 -v 4 -l TLS13-AES128-GCM-SHA256 # client TLSv1.3 DH key exchange -v 4 -l TLS13-AES128-GCM-SHA256 -y # server TLSv1.3 -v 4 -l TLS13-AES128-GCM-SHA256 # client TLSv1.3 ECC key exchange -v 4 -l TLS13-AES128-GCM-SHA256 -Y # server TLSv1.3 -v 4 -l TLS13-AES128-GCM-SHA256 # client TLSv1.3 ECC key exchange -v 4 -l TLS13-AES128-GCM-SHA256 -Y # server TLSv1.3 multiple cipher suites -v 4 -l TLS13-AES128-GCM-SHA256:TLS13-AES256-GCM-SHA384:TLS13-CHACHA20-POLY1305-SHA256:TLS13-AES128-CCM-SHA256:TLS13-AES128-CCM-8-SHA256 # client TLSv1.3 -v 4 -l TLS13-AES128-GCM-SHA256:TLS13-AES256-GCM-SHA384:TLS13-CHACHA20-POLY1305-SHA256:TLS13-AES128-CCM-SHA256:TLS13-AES128-CCM-8-SHA256 # server TLSv1.3 KeyUpdate -v 4 -l TLS13-AES128-GCM-SHA256 -U # client TLSv1.3 KeyUpdate -v 4 -l TLS13-AES128-GCM-SHA256 -I # server TLSv1.3 No session ticket -v 4 -l TLS13-AES128-GCM-SHA256 -T # client TLSv1.3 No session ticket -v 4 -l TLS13-AES128-GCM-SHA256 # server TLSv1.3 Post-Handshake Authentication -v 4 -l TLS13-AES128-GCM-SHA256 -Q # client TLSv1.3 Post-Handshake Authentication -v 4 -l TLS13-AES128-GCM-SHA256 -Q # server TLSv1.3 Send Ticket explicitly -v 4 -l TLS13-AES128-GCM-SHA256 --send-ticket # client TLSv1.3 Send Ticket explicitly -v 4 -l TLS13-AES128-GCM-SHA256 # server TLSv1.3 Integrity-only SHA256 -v 4 -l TLS13-SHA256-SHA256 # client TLSv1.3 Integrity-only SHA256 -v 4 -l TLS13-SHA256-SHA256 # server TLSv1.3 Integrity-only SHA384 -v 4 -l TLS13-SHA384-SHA384 # client TLSv1.3 Integrity-only SHA384 -v 4 -l TLS13-SHA384-SHA384