# display ssh2 algorithm

Use display ssh2 algorithm to display algorithms used by SSH2 in the algorithm negotiation stage.

## Syntax

display ssh2 algorithm

## Views

Any view

## Predefined user roles

network-admin

network-operator

mdc-admin

mdc-operator

## Examples

# Display algorithms used by SSH2 in the algorithm negotiation stage.

<Sysname> display ssh2 algorithm Key exchange algorithms : ecdh-sha2-nistp256 ecdh-sha2-nistp384 dh-group-exchange-sha1 dh-group14-sha1 dh-group1-sha1 Public key algorithms : x509v3-ecdsa-sha2-nistp256 x509v3-ecdsa-sha2-nistp384 ecdsa-sha2-nistp256 ecdsa-sha2-nistp384 rsa dsa Encryption algorithms : aes128-ctr aes192-ctr aes256-ctr aes128-gcm aes256-gcm aes128-cbc 3des-cbc aes256-cbc des-cbc MAC algorithms : sha2-256 sha2-512 sha1 md5 sha1-96 md5-96

Table 65: Command output

Field | Description |
---|---|

Key exchange algorithms | Key exchange algorithms in descending order of priority for algorithm negotiation. |

Public key algorithms | Public key algorithms in descending order of priority for algorithm negotiation. |

Encryption algorithms | Encryption algorithms in descending order of priority for algorithm negotiation. |

MAC algorithms | HMAC algorithms in descending order of priority for algorithm negotiation. |

## Related commands

ssh2 algorithm cipher

ssh2 algorithm key-exchange

ssh2 algorithm mac

ssh2 algorithm public-key