With TLS > 1.2 and all Diffie-Hellman method you must export TLS session keys in a keylog file as describes here:
https://wiki.wireshark.org/TLS#tls-decryption
After you can pass this keylog to TShark / Wireshark to decrypt traffic.
If not supported natively, you can patch your application to export TLS keys from TLS engine to a keylog file to be passed to tshark like I did for gFTP:
https://github.com/nbanb/gftp/commit/2b9ac2c2b27af214504c23ec56264de64592a9b0
And for OpenSSH:
https://github.com/nbanb/openssh-portable/tree/nba-ssh-kl-20250508