# specific for early data
./start_openssl --port 44330 --prefix /opt/openssl1.1.1 --cert rsa --cert2 ecdsa -- -early_data
    python tests/tls13/test_tls13_EarlyData.py

# general for TLS13
./start_openssl --port 44330 --prefix /opt/openssl1.1.1 --cert rsa --cert2 ecdsa --mode www
    python tests/tls13/test_tls13_TLS_AES_128_GCM_SHA256.py
    python tests/tls13/test_tls13_TLS_AES_256_GCM_SHA384.py
    python tests/tls13/test_tls13_TLS_CHACHA20_POLY1305_SHA256.py

# TLS1.3, CCM
./start_openssl --port 44330 --prefix /opt/openssl1.1.1 --cert rsa --cert2 ecdsa --mode www -- -ciphersuites TLS_AES_128_CCM_SHA256:TLS_AES_128_CCM_8_SHA256
    python tests/tls13/test_tls13_TLS_AES_128_CCM_SHA256.py
    python tests/tls13/test_tls13_TLS_AES_128_CCM_8_SHA256.py

# Scan
./start_openssl --port 44330 --prefix /opt/openssl3.0.0 --cert rsa --cert2 ecdsa --mode www
    python tests/tlssuites/test_eval_cipher_suites_openssl3_0_0.py
    python tests/tlssuites/test_supported_groups_openssl3_0_0.py
    python tests/tlssuites/test_sig_algos_openssl3_0_0.py

# Client-Auth during Handshake TLS1.2, RSA
./start_openssl --port 44330 --prefix /opt/openssl1.1.1 --cert rsa --cert2 ecdsa --mode www -- -verify 3 -client_sigalgs RSA+SHA256
    python tests/tls12/test_tls12_ClientAuth_RSA_SHA256.py

# Client-Auth during Handshake, PSS_RSAE
./start_openssl --port 44330 --prefix /opt/openssl1.1.1 --cert rsa --cert2 ecdsa --mode www -- -verify 3 -client_sigalgs rsa_pss_rsae_sha256
    python tests/tls12/test_tls12_ClientAuth_PSS_RSAE_SHA256.py
    python tests/tls13/test_tls13_ClientAuth_PSS_RSAE_SHA256.py

# Client-Auth during Handshake, ECDSA+SHA256
./start_openssl --port 44330 --prefix /opt/openssl1.1.1 --cert rsa --cert2 ecdsa --mode www -- -verify 3 -client_sigalgs ECDSA+SHA256
    python tests/tls12/test_tls12_ClientAuth_ECDSA_SHA256.py
    python tests/tls13/test_tls13_ClientAuth_ECDSA_SHA256.py

# Client-Auth after Handshake TLS1.2, RSA
# Press R on the server side to initiate renegotiation with client auth
./start_openssl --port 44330 --prefix /opt/openssl1.1.1 --cert rsa --cert2 ecdsa -- -client_sigalgs RSA+SHA256 -legacy_renegotiation
    python tests/tls12/test_tls12_ClientAuth_RSA_SHA256_posthandshake.py

# Client-Auth after Handshake, PSS-RSAE
# Press R (TLS1.2) on the server side to initiate renegotiation with client auth
# Press c (TLS1.3) on the server side to initiate renegotiation with client auth
./start_openssl --port 44330 --prefix /opt/openssl1.1.1 --cert rsa --cert2 ecdsa -- -client_sigalgs rsa_pss_rsae_sha256 -legacy_renegotiation
    python tests/tls12/test_tls12_ClientAuth_PSS_RSAE_SHA256_posthandshake.py
    python tests/tls13/test_tls13_ClientAuth_PSS_RSAE_SHA256_posthandshake.py

# Client-Auth after Handshake, ECDSA+SHA256
# Press R (TLS1.2) on the server side to initiate renegotiation with client auth
# Press c (TLS1.3) on the server side to initiate renegotiation with client auth
./start_openssl --port 44330 --prefix /opt/openssl1.1.1 --cert rsa --cert2 ecdsa -- -client_sigalgs ECDSA+SHA256 -legacy_renegotiation
    python tests/tls12/test_tls12_ClientAuth_ECDSA_SHA256_posthandshake.py
    python tests/tls13/test_tls13_ClientAuth_ECDSA_SHA256_posthandshake.py

# SSLv2
./start_openssl --port 44330 --prefix /opt/openssl1.0.2  --mode www --sslv2
    python tests/ssl2/test_ssl2_ServerHello.py

# SSLv3
./start_openssl --port 44330 --prefix /opt/openssl1.0.2 --cert rsa --cert2 ecdsa --mode www -- -ssl3
    python tests/ssl3/test_ssl3_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA.py

# TLS10
./start_openssl --port 44330 --prefix /opt/openssl1.0.2 --cert rsa --cert2 ecdsa --mode www
    python tests/tls10/test_tls10_TLS_DH_ANON_WITH_AES_128_CBC_SHA.py
    python tests/tls10/test_tls10_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA.py
    python tests/tls11/test_tls11_TLS_RSA_WITH_RC4_128_SHA.py
    python tests/tls11/test_tls11_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA.py
    python tests/tls11/test_tls11_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA.py
    python tests/tls11/test_tls11_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA.py
    python tests/tls11/test_tls11_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA.py
    python tests/tls11/test_tls11_TLS_RSA_WITH_IDEA_CBC_SHA.py
    python tests/tls11/test_tls11_TLS_RSA_WITH_RC4_128_SHA.py
    python tests/tls12/test_tls12_ExtendedMasterSecret.py
    python tests/tls12/test_tls12_ResumptionByTicket.py
    python tests/tls12/test_tls12_SecureRenegotiation.py
    python tests/tls12/test_tls12_SecureRenegotiationSCSV.py

# TLS12
./start_openssl --port 44330 --cert rsa --cert2 ecdsa --mode www
    python tests/tls12/test_tls12_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256.py
    python tests/tls12/test_tls12_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256.py
    python tests/tls12/test_tls12_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA.py
    python tests/tls12/test_tls12_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256.py
    python tests/tls12/test_tls12_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA.py
    python tests/tls12/test_tls12_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384.py
    python tests/tls12/test_tls12_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256.py
    python tests/tls12/test_tls12_TLS_RSA_WITH_AES_128_GCM_SHA256.py
    python tests/tls12/test_tls12_EncryptThenMac.py
    python tests/tls12/test_tls12_ResumptionById.py
    python tests/features/test_features_ClientProfiles.py

# ECDH, TLS1.2
./start_openssl --port 44330 --prefix /opt/openssl1.0.2 --cert rsa --cert2 ecdsa --mode www -- -cipher ALL
    python tests/tls12/test_tls12_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256.py
    python tests/tlssuites/test_eval_cipher_suites_openssl1_0_2.py
    python tests/tlssuites/test_supported_groups_openssl1_0_2.py
    python tests/tlssuites/test_sig_algos_openssl1_0_2.py


# TLS1.2, CCM
./start_openssl --port 44330 --cert rsa --cert2 ecdsa --mode www -- -cipher ALL
    python tests/tls12/test_tls12_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8.py
    python tests/tls12/test_tls12_TLS_ECDHE_ECDSA_WITH_AES_128_CCM.py
    python tests/tls12/test_tls12_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8.py
    python tests/tls12/test_tls12_TLS_ECDHE_ECDSA_WITH_AES_256_CCM.py
    python tests/tls12/test_tls12_SupportedGroups_SECP256R1.py
    python tests/tls12/test_tls12_SupportedGroups_SECP384R1.py
    python tests/tls12/test_tls12_SupportedGroups_SECP521R1.py
    python tests/tls12/test_tls12_SupportedGroups_X25519.py
    python tests/tls12/test_tls12_SupportedGroups_X448.py
    python tests/tls13/test_tls13_TLS_AES_128_GCM_SHA256.py
    python tests/tls13/test_tls13_TLS_AES_256_GCM_SHA384.py
    python tests/tls13/test_tls13_TLS_CHACHA20_POLY1305_SHA256.py

# Curves
./start_openssl --port 44330 --cert rsa --cert2 ecdsa --mode www -- -cipher ALL -curves sect233k1:sect163r2:sect163k1:sect233r1:sect283k1:sect283r1:sect409k1:sect409r1:sect571k1:sect571r1:secp224r1:secp256k1:brainpoolP256r1:brainpoolP384r1:brainpoolP512r1
    python tests/tls12/test_tls12_SupportedGroups_BRAINPOOLP256R1.py
    python tests/tls12/test_tls12_SupportedGroups_BRAINPOOLP384R1.py
    python tests/tls12/test_tls12_SupportedGroups_BRAINPOOLP512R1.py
    python tests/tls12/test_tls12_SupportedGroups_SECP224R1.py
    python tests/tls12/test_tls12_SupportedGroups_SECP256K1.py
    python tests/tls12/test_tls12_SupportedGroups_SECT233K1.py
    python tests/tls12/test_tls12_SupportedGroups_SECT233R1.py
    python tests/tls12/test_tls12_SupportedGroups_SECT283K1.py
    python tests/tls12/test_tls12_SupportedGroups_SECT283R1.py
    python tests/tls12/test_tls12_SupportedGroups_SECT409K1.py
    python tests/tls12/test_tls12_SupportedGroups_SECT409R1.py
    python tests/tls12/test_tls12_SupportedGroups_SECT571K1.py
    python tests/tls12/test_tls12_SupportedGroups_SECT571R1.py

# Curves
./start_openssl --port 44330 --prefix /opt/openssl1.1.1 --cert rsa --cert2 ecdsa --mode www -- -cipher ALL -curves sect233k1:sect163r2:sect163k1:sect233r1:sect283k1:sect283r1:sect409k1:sect409r1:sect571k1:sect571r1:secp224r1:secp256k1:brainpoolP256r1:brainpoolP384r1:brainpoolP512r1
    python tests/tls12/test_tls12_SupportedGroups_SECT163K1.py
    python tests/tls12/test_tls12_SupportedGroups_SECT163R2.py

# legacy renegotiation
./start_openssl --port 44330 --prefix /opt/openssl1.0.2 --cert rsa --cert2 ecdsa --mode www -- -legacy_renegotiation
    python tests/tls12/test_tls12_Legacy_Renegotiation_Client.py

# legacy renegotiation, server
# Press r on the server side
./start_openssl --port 44330 --prefix /opt/openssl1.0.2 --cert rsa --cert2 ecdsa -- -legacy_renegotiation
    python tests/tls12/test_tls12_Legacy_Renegotiation_Server.py

# TLS1.3, CCM
./start_openssl --port 44330 --prefix /opt/openssl1.1.1 --cert rsa --cert2 ecdsa --mode www -- -cipher ALL -ciphersuites TLS_AES_128_CCM_SHA256:TLS_AES_128_CCM_8_SHA256
    python tests/tls13/test_tls13_TLS_AES_128_CCM_SHA256.py
    python tests/tls13/test_tls13_TLS_AES_128_CCM_8_SHA256.py

# TLS1.3, early_data
./start_openssl --port 44330 --prefix /opt/openssl1.1.1 --cert rsa --cert2 ecdsa --mode early_data
    python tests/tls13/test_tls13_EarlyData.py

