login about faq

I'm running the SFTP Public-Key Authentication example for VB.net. The FromOpenSshPrivateKey returns false, but LastErrorText seems to say everything succeeded. I'm not sure what to make of the return value. Here is the LastErrorText:

 ChilkatLog:
  Connect:
    DllDate: Aug  3 2011
    UnlockPrefix: UPSDEUSSH
    Username: KYLOULAPP5K8Q:app1dak
    Architecture: Little Endian; 32-bit
    Language: .NET 2.0
    SftpVersion: 0
    ChilkatObjectID: 4532
    hostname: 193.191.216.90
    port: 22
    ConnectTimeoutMs: 5000
    calling ConnectSocket2
    This is an IPV4 numeric address...
    AddrInfoList:
      AddrInfo:
        ai_flags: 4
        ai_family: 2
        ai_socktype: 1
        ai_protocol: 0
        ai_addrlen: 16
        ai_canonname: (NULL)
    Connect using IPV4.
    ipAddress1: 193.191.216.90
    myIP_3: 10.123.10.45
    myPort_3: 62024
    connect successful.
    Established TCP/IP connection with SSH server
    clientIdentifier: SSH-2.0-PuTTY_Local:_May_11_2009_17:22:38
    initialDataFromSshServer: SSH-2.0-SFTP Server

    serverVersion: SSH-2.0-SFTP Server
    KeyExchangeAlgs:
      algorithm: diffie-hellman-group1-sha1
      algorithm: diffie-hellman-group14-sha1
      algorithm: diffie-hellman-group-exchange-sha1
      algorithm: diffie-hellman-group-exchange-sha256
    HostKeyAlgs:
      algorithm: ssh-rsa
    EncCS:
      algorithm: blowfish-cbc
      algorithm: 3des-ctr
      algorithm: aes128-ctr
      algorithm: aes192-ctr
      algorithm: aes256-ctr
      algorithm: 3des-cbc
      algorithm: aes128-cbc
      algorithm: aes192-cbc
      algorithm: aes256-cbc
      algorithm: arcfour
      algorithm: arcfour128
      algorithm: arcfour256
      algorithm: twofish256-cbc
      algorithm: twofish192-cbc
      algorithm: twofish128-cbc
      algorithm: cast128-cbc
    EncSC:
      algorithm: blowfish-cbc
      algorithm: 3des-ctr
      algorithm: aes128-ctr
      algorithm: aes192-ctr
      algorithm: aes256-ctr
      algorithm: 3des-cbc
      algorithm: aes128-cbc
      algorithm: aes192-cbc
      algorithm: aes256-cbc
      algorithm: arcfour
      algorithm: arcfour128
      algorithm: arcfour256
      algorithm: twofish256-cbc
      algorithm: twofish192-cbc
      algorithm: twofish128-cbc
      algorithm: cast128-cbc
    MacCS:
      algorithm: hmac-sha1
      algorithm: hmac-md5
      algorithm: hmac-md5-96
      algorithm: hmac-sha1-96
      algorithm: hmac-sha256
      algorithm: hmac-sha2-256
      algorithm: hmac-sha256@ssh.com
    MacSC:
      algorithm: hmac-sha1
      algorithm: hmac-md5
      algorithm: hmac-md5-96
      algorithm: hmac-sha1-96
      algorithm: hmac-sha256
      algorithm: hmac-sha2-256
      algorithm: hmac-sha256@ssh.com
    CompCS:
      algorithm: none
      algorithm: zlib
    CompSC:
      algorithm: none
      algorithm: zlib
    Encryption: 256-bit AES
    Encryption: 256-bit AES
    MAC: HMAC-SHA1
    MAC: HMAC-SHA1
    Compression: none
    Compression: none
    Key Exchange: DH Group Exchange SHA256
    Host Key Algorithm: RSA
    numBits: 256
    pbits: 4096
    Using GEX Group.
    Sending KEX_DH_GEX_REQUEST...
    pbits: 4096
    Received GEX Group.
    Sent e to server.
    Using SHA256 for Exchange Hash
    RSA host key parsed successfully.
    keyXml: <RSAKeyValue><Modulus>h8ASEtD1JwXo1cqi9uFZm6op9TeSx1YGqFj4DKZiyElNaVx81tP3OVpuv1STZU5MmFgWD3DA36/4i3ra0MfUK2+Nx7IC+NjgBMfqIbGIqNP4WrNLWopjoVwpzqhTMhJ8U+a4BmH+hyL4FrF34XGsSJEaR5ru1up6AGnWbeLzECiEv3COP9U7IszongCbF7E2d1Da2RChNFk8JBRa8sgFc1v+7aN9yIj0fpivNMDq2h76mL4edQlf5Pamg/AaFve6wS6f6pfaVSwJyFVHh5avsYJmx/5jE3nmrPYhiX3VeIJEMXDRMKvwuG3mi1wjj82KfQzh/RRGaUcwC4t4PkBu6Q==</Modulus><Exponent>AQAB</Exponent></RSAKeyValue>
    HostKeyNumBits: 2048
    RSA signature verification success.
    Sending newkeys to server...
    Expecting newkeys from server...
    SSH Key Exchange Success.
    Outgoing encryption is now AES 256
    algorithm: aes
    keyLength: 256
    Success.

asked Jan 19 at 09:41

app1dak's gravatar image

app1dak
51


You are showing the LastErrorText for the ssh object, not the key object. The name of the method is in the 2nd line of the LastErrorText. If you called FromOpenSshPrivateKey, and you do not see "FromOpenSshPrivateKey" in the 2nd line, then you're NOT looking at the LastErrorText for that particular method call.

link

answered Jan 21 at 14:07

chilkat's gravatar image

chilkat ♦♦
11.8k316358420

1

Thanks! Like most software and computer problems, it was a user error.

(Jan 25 at 08:08) app1dak

DllDate: Aug  3 2011
Have you tried the current release? This is almost 5 years old.

link

answered Jan 19 at 12:31

Gert's gravatar image

Gert ♦
629141824

I updated to 9.5.0.55 and get same results.

(Jan 21 at 08:06) app1dak
Your answer
toggle preview

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here

By RSS:

Answers

Answers and Comments

Markdown Basics

  • *italic* or __italic__
  • **bold** or __bold__
  • link:[text](http://url.com/ "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported

Tags:

×200
×3

Asked: Jan 19 at 09:41

Seen: 592 times

Last updated: Jan 25 at 08:08

powered by OSQA