# server DTLSv1.3 with post-quantum group -u -v 4 -l TLS13-AES256-GCM-SHA384 --pqc P256_ML_KEM_512 # client DTLSv1.3 with post-quantum group -u -v 4 -l TLS13-AES256-GCM-SHA384 --pqc P256_ML_KEM_512 # server DTLSv1.3 with post-quantum hybrid group -u -v 4 -l TLS13-AES256-GCM-SHA384 --pqc X25519_ML_KEM_512 # client DTLSv1.3 with post-quantum hybrid group -u -v 4 -l TLS13-AES256-GCM-SHA384 --pqc X25519_ML_KEM_512 # Hybrids with ML_KEM_768 and ML_KEM_1024 would fragment the ClientHello. # server DTLSv1.3 with post-quantum hybrid group -u -v 4 -l TLS13-AES256-GCM-SHA384 --pqc P256_KYBER_LEVEL1 # client DTLSv1.3 with post-quantum hybrid group -u -v 4 -l TLS13-AES256-GCM-SHA384 --pqc P256_KYBER_LEVEL1 # server DTLSv1.3 with post-quantum hybrid group -u -v 4 -l TLS13-AES256-GCM-SHA384 --pqc X25519_KYBER_LEVEL1 # client DTLSv1.3 with post-quantum hybrid group -u -v 4 -l TLS13-AES256-GCM-SHA384 --pqc X25519_KYBER_LEVEL1 # Hybrids with KYBER_LEVEL3 and KYBER_LEVEL5 would fragment the ClientHello.