I'm running the SFTP Public-Key Authentication example for VB.net. The FromOpenSshPrivateKey returns false, but LastErrorText seems to say everything succeeded. I'm not sure what to make of the return value. Here is the LastErrorText:
ChilkatLog:
Connect:
DllDate: Aug 3 2011
UnlockPrefix: UPSDEUSSH
Username: KYLOULAPP5K8Q:app1dak
Architecture: Little Endian; 32-bit
Language: .NET 2.0
SftpVersion: 0
ChilkatObjectID: 4532
hostname: 193.191.216.90
port: 22
ConnectTimeoutMs: 5000
calling ConnectSocket2
This is an IPV4 numeric address...
AddrInfoList:
AddrInfo:
ai_flags: 4
ai_family: 2
ai_socktype: 1
ai_protocol: 0
ai_addrlen: 16
ai_canonname: (NULL)
Connect using IPV4.
ipAddress1: 193.191.216.90
myIP_3: 10.123.10.45
myPort_3: 62024
connect successful.
Established TCP/IP connection with SSH server
clientIdentifier: SSH-2.0-PuTTY_Local:_May_11_2009_17:22:38
initialDataFromSshServer: SSH-2.0-SFTP Server
serverVersion: SSH-2.0-SFTP Server
KeyExchangeAlgs:
algorithm: diffie-hellman-group1-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group-exchange-sha256
HostKeyAlgs:
algorithm: ssh-rsa
EncCS:
algorithm: blowfish-cbc
algorithm: 3des-ctr
algorithm: aes128-ctr
algorithm: aes192-ctr
algorithm: aes256-ctr
algorithm: 3des-cbc
algorithm: aes128-cbc
algorithm: aes192-cbc
algorithm: aes256-cbc
algorithm: arcfour
algorithm: arcfour128
algorithm: arcfour256
algorithm: twofish256-cbc
algorithm: twofish192-cbc
algorithm: twofish128-cbc
algorithm: cast128-cbc
EncSC:
algorithm: blowfish-cbc
algorithm: 3des-ctr
algorithm: aes128-ctr
algorithm: aes192-ctr
algorithm: aes256-ctr
algorithm: 3des-cbc
algorithm: aes128-cbc
algorithm: aes192-cbc
algorithm: aes256-cbc
algorithm: arcfour
algorithm: arcfour128
algorithm: arcfour256
algorithm: twofish256-cbc
algorithm: twofish192-cbc
algorithm: twofish128-cbc
algorithm: cast128-cbc
MacCS:
algorithm: hmac-sha1
algorithm: hmac-md5
algorithm: hmac-md5-96
algorithm: hmac-sha1-96
algorithm: hmac-sha256
algorithm: hmac-sha2-256
algorithm: hmac-sha256@ssh.com
MacSC:
algorithm: hmac-sha1
algorithm: hmac-md5
algorithm: hmac-md5-96
algorithm: hmac-sha1-96
algorithm: hmac-sha256
algorithm: hmac-sha2-256
algorithm: hmac-sha256@ssh.com
CompCS:
algorithm: none
algorithm: zlib
CompSC:
algorithm: none
algorithm: zlib
Encryption: 256-bit AES
Encryption: 256-bit AES
MAC: HMAC-SHA1
MAC: HMAC-SHA1
Compression: none
Compression: none
Key Exchange: DH Group Exchange SHA256
Host Key Algorithm: RSA
numBits: 256
pbits: 4096
Using GEX Group.
Sending KEX_DH_GEX_REQUEST...
pbits: 4096
Received GEX Group.
Sent e to server.
Using SHA256 for Exchange Hash
RSA host key parsed successfully.
keyXml: <RSAKeyValue><Modulus>h8ASEtD1JwXo1cqi9uFZm6op9TeSx1YGqFj4DKZiyElNaVx81tP3OVpuv1STZU5MmFgWD3DA36/4i3ra0MfUK2+Nx7IC+NjgBMfqIbGIqNP4WrNLWopjoVwpzqhTMhJ8U+a4BmH+hyL4FrF34XGsSJEaR5ru1up6AGnWbeLzECiEv3COP9U7IszongCbF7E2d1Da2RChNFk8JBRa8sgFc1v+7aN9yIj0fpivNMDq2h76mL4edQlf5Pamg/AaFve6wS6f6pfaVSwJyFVHh5avsYJmx/5jE3nmrPYhiX3VeIJEMXDRMKvwuG3mi1wjj82KfQzh/RRGaUcwC4t4PkBu6Q==</Modulus><Exponent>AQAB</Exponent></RSAKeyValue>
HostKeyNumBits: 2048
RSA signature verification success.
Sending newkeys to server...
Expecting newkeys from server...
SSH Key Exchange Success.
Outgoing encryption is now AES 256
algorithm: aes
keyLength: 256
Success.