Like you rightly mentioned, it is only deprecated. But when used on iOS 13.0, it fails. And therefore, the socket channel is not established.
I also tested the same using Wireshark. On iOS 12.0, I can see TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 cipher in the Client Hello message. Also, I see that the server uses this cipher in the Server Hello message.
Server Hello message for iOS 12.0:
Transport Layer Security
TLSv1.2 Record Layer: Handshake Protocol: Server Hello
Content Type: Handshake (22)
Version: TLS 1.2 (0x0303)
Length: 58
Handshake Protocol: Server Hello
Handshake Type: Server Hello (2)
Length: 54
Version: TLS 1.2 (0x0303)
Random: d9aca2cc52894acb35383b9364bacfd2649474...
Session ID Length: 0
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x009f)
Compression Method: null (0)
Extensions Length: 14
Extension: renegotiation_info (len=1)
Extension: session_ticket (len=0)
Extension: heartbeat (len=1)
However, on iOS 13.0, the Client Hello message itself does not contain the above mentioned cipher even when using the same sec_protocol_options_add_tls_ciphersuite.
Client Hello message on iOS 13.0:
Transport Layer Security
TLSv1 Record Layer: Handshake Protocol: Client Hello
Content Type: Handshake (22)
Version: TLS 1.0 (0x0301)
Length: 163
Handshake Protocol: Client Hello
Handshake Type: Client Hello (1)
Length: 159
Version: TLS 1.2 (0x0303)
Random: 424ca25c38294acb35383b0964bcafd2641174...
Session ID Length: 0
Cipher Suites Length: 48
Cipher Suites (24 suites)
Cipher Suite: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (0x0016)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc024)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc023)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA (0xc00a)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA (0xc009)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca9)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)
Cipher Suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca8)
Cipher Suite: TLS_RSA_WITH_AES_256_GCM_SHA384 (0x009d)
Cipher Suite: TLS_RSA_WITH_AES_128_GCM_SHA256 (0x009c)
Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA256 (0x003d)
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA256 (0x003c)
Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA (0x0035)
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA (0x002f)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (0xc008)
Cipher Suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (0xc012)
Cipher Suite: TLS_RSA_WITH_3DES_EDE_CBC_SHA (0x000a)
Compression Methods Length: 1
Compression Methods (1 method)
Extensions Length: 70
Extension: renegotiation_info (len=1)
Extension: extended_master_secret (len=0)
Extension: signature_algorithms (len=24)
Extension: status_request (len=5)
Extension: signed_certificate_timestamp (len=0)
Extension: ec_point_formats (len=2)
Extension: supported_groups (len=10)
And hence, the server hello fails.
Please help in this regard. All your responses and suggestions are much appreciated.