# server TLSv1.3 PSK # Use AES128-GCM and SHA256 -v 4 -s -l TLS13-AES128-GCM-SHA256 -d # client TLSv1.3 PSK # Use AES128-GCM and SHA256 -v 4 -s -l TLS13-AES128-GCM-SHA256 # server TLSv1.3 PSK plus -v 4 -j -l TLS13-AES128-GCM-SHA256 -d # client TLSv1.3 PSK -v 4 -s -l TLS13-AES128-GCM-SHA256 # server TLSv1.3 PSK -v 4 -j -l TLS13-AES128-GCM-SHA256 -d # client TLSv1.3 not-PSK -v 4 -l TLS13-AES128-GCM-SHA256 # server TLSv1.3 PSK # AES256-GCM and SHA384 -v 4 -s -l TLS13-AES256-GCM-SHA384 -d # client TLSv1.3 PSK # AES256-GCM and SHA384 -v 4 -s -l TLS13-AES256-GCM-SHA384 # server TLSv1.3 PSK # AES256-GCM and SHA384 -v 4 -s -l TLS13-AES256-GCM-SHA384 -d -K # client TLSv1.3 PSK # AES256-GCM and SHA384 -v 4 -s -l TLS13-AES256-GCM-SHA384 -K # server TLSv1.3 PSK # AES256-GCM and SHA384 -v 4 -s -l TLS13-AES256-GCM-SHA384 -d --onlyPskDheKe # client TLSv1.3 PSK # AES256-GCM and SHA384 -v 4 -s -l TLS13-AES256-GCM-SHA384 --onlyPskDheKe # Disabling ChaCha20 results in failures. # server TLSv1.3 PSK # CHACHA20 only supported #-v 4 #-s #-l TLS13-CHACHA20-POLY1305-SHA256 # client TLSv1.3 PSK # AESGCM-SHA256 is first but CHACHA20 is negotiated as it is also SHA-256 #-v 4 #-s #-l TLS13-AES128-GCM-SHA256:TLS13-CHACHA20-POLY1305-SHA256 # server TLSv1.3 PSK # AESGCM-SHA256 is first but CHACHA20 is negotiated as it is also SHA-256 #-v 4 #-s #-l TLS13-AES128-GCM-SHA256:TLS13-CHACHA20-POLY1305-SHA256 # client TLSv1.3 PSK # CHACHA20 only supported #-v 4 #-s #-l TLS13-CHACHA20-POLY1305-SHA256 # server TLSv1.3 PSK # AESGCM-SHA256 is first but CHACHA20 is negotiated as it is also SHA-256 #-v 4 #-s #-l TLS13-AES128-GCM-SHA256:TLS13-CHACHA20-POLY1305-SHA256 # client TLSv1.3 PSK # CHACHA20 only supported #-v 4 #-s #-l TLS13-CHACHA20-POLY1305-SHA256:TLS13-AES128-GCM-SHA256