# server TLSv1.3 TLS13-CHACHA20-POLY1305-SHA256 -v 4 -l TLS13-CHACHA20-POLY1305-SHA256 -2 # client TLSv1.3 TLS13-CHACHA20-POLY1305-SHA256 -v 4 -l TLS13-CHACHA20-POLY1305-SHA256 -2 # server TLSv1.3 TLS13-AES128-GCM-SHA256 -v 4 -l TLS13-AES128-GCM-SHA256 -2 # client TLSv1.3 TLS13-AES128-GCM-SHA256 -v 4 -l TLS13-AES128-GCM-SHA256 -2 # server TLSv1.3 TLS13-AES256-GCM-SHA384 -v 4 -l TLS13-AES256-GCM-SHA384 -2 # client TLSv1.3 TLS13-AES256-GCM-SHA384 -v 4 -l TLS13-AES256-GCM-SHA384 -2 # server TLSv1.3 TLS13-AES128-CCM-SHA256 -v 4 -l TLS13-AES128-CCM-SHA256 -2 # client TLSv1.3 TLS13-AES128-CCM-SHA256 -v 4 -l TLS13-AES128-CCM-SHA256 -2 # server TLSv1.3 TLS13-AES128-CCM-8-SHA256 -v 4 -l TLS13-AES128-CCM-8-SHA256 -2 # client TLSv1.3 TLS13-AES128-CCM-8-SHA256 -v 4 -l TLS13-AES128-CCM-8-SHA256 -2 # server TLSv1.3 resumption -v 4 -l TLS13-AES128-GCM-SHA256 -r -2 # client TLSv1.3 resumption -v 4 -l TLS13-AES128-GCM-SHA256 -r -2 # server TLSv1.3 resumption - SHA384 -v 4 -l TLS13-AES256-GCM-SHA384 -r -2 # client TLSv1.3 resumption - SHA384 -v 4 -l TLS13-AES256-GCM-SHA384 -r -2 # server TLSv1.3 PSK without (EC)DHE -v 4 -l TLS13-AES128-GCM-SHA256 -r -2 # client TLSv1.3 PSK without (EC)DHE -v 4 -l TLS13-AES128-GCM-SHA256 -r -K -2 # server TLSv1.3 accepting EarlyData -v 4 -l TLS13-AES128-GCM-SHA256 -r -0 -2 # client TLSv1.3 sending EarlyData -v 4 -l TLS13-AES128-GCM-SHA256 -r -0 -2 # server TLSv1.3 not accepting EarlyData -v 4 -l TLS13-AES128-GCM-SHA256 -r -2 # client TLSv1.3 sending EarlyData -v 4 -l TLS13-AES128-GCM-SHA256 -r -0 -2 # server TLSv1.3 accepting EarlyData -v 4 -l TLS13-AES128-GCM-SHA256 -r -0 -2 # client TLSv1.3 not sending EarlyData -v 4 -l TLS13-AES128-GCM-SHA256 -r -2 # server TLSv1.3 -v 4 -l TLS13-AES128-GCM-SHA256 -2 # client TLSv1.3 Fragments -v 4 -l TLS13-AES128-GCM-SHA256 -F 1 -2 # server TLSv1.3 -v 4 -l TLS13-AES128-GCM-SHA256 -2 # client TLSv1.3 HelloRetryRequest to negotiate Key Exchange algorithm -v 4 -l TLS13-AES128-GCM-SHA256 -J -2 # server TLSv1.3 -v 4 -l TLS13-AES128-GCM-SHA256 -J -2 # client TLSv1.3 HelloRetryRequest with cookie -v 4 -l TLS13-AES128-GCM-SHA256 -J -2 # server TLSv1.3 -v 4 -l TLS13-AES128-GCM-SHA256 -2 # client TLSv1.3 no client certificate -v 4 -l TLS13-AES128-GCM-SHA256 -x -2 # server TLSv1.3 -v 4 -l TLS13-AES128-GCM-SHA256 -2 # client TLSv1.3 DH key exchange -v 4 -l TLS13-AES128-GCM-SHA256 -y -2 # server TLSv1.3 -v 4 -l TLS13-AES128-GCM-SHA256 -2 # client TLSv1.3 ECC key exchange -v 4 -l TLS13-AES128-GCM-SHA256 -Y -2 # server TLSv1.3 -v 4 -l TLS13-AES128-GCM-SHA256 -2 # client TLSv1.3 ECC key exchange -v 4 -l TLS13-AES128-GCM-SHA256 -Y -2 # server TLSv1.3 multiple cipher suites -v 4 -l TLS13-AES128-GCM-SHA256:TLS13-AES256-GCM-SHA384:TLS13-CHACHA20-POLY1305-SHA256:TLS13-AES128-CCM-SHA256:TLS13-AES128-CCM-8-SHA256 -2 # client TLSv1.3 -v 4 -2 # server TLSv1.3 KeyUpdate -v 4 -l TLS13-AES128-GCM-SHA256 -U -2 # client TLSv1.3 KeyUpdate -v 4 -l TLS13-AES128-GCM-SHA256 -I -2 # server TLSv1.3 Post-Handshake Authentication -v 4 -l TLS13-AES128-GCM-SHA256 -Q -2 # client TLSv1.3 Post-Handshake Authentication -v 4 -l TLS13-AES128-GCM-SHA256 -Q -2