Hmmm, indeed. But I wonder why oclHashcat is reporting 'Line-length exception' for every hash I try where hashcat is working quite OK with the whole set not complaining about anything? Both tools are at the recent available revisions, OS Win10 64bit with latest crimson software (radeon, r9 295x2) - not sure if that matters. Tried combinations with ascii salt and hex salt - same result. Hashcat is cracking passwords, oclhashcat is complaining about line length.
Salt is 12 characters long (hex24 character long of course), pass (hash) is 40 characters long.
EDIT: got answer on IRC from philsmd (thanks!) - hope you don't mind if I put it here.
So it seems that hashcat do not care about salt length when using "-m 7600" options, but oclHashcat does for performance reasons.
NeoTherm1c pointed out that there is already md5($salt.md5($str)) algo supported so perhaps sha1($salt.sha1($str)) should be requested.
I gave it a shot, and here is the request: https://github.com/hashcat/oclHashcat/issues/29
Salt is 12 characters long (hex24 character long of course), pass (hash) is 40 characters long.
EDIT: got answer on IRC from philsmd (thanks!) - hope you don't mind if I put it here.
Code:
<@philsmd> redmine uses a fixed salt length (32), oclHashcat does this additional check
when parsing hashes (for performance reasons, only exactly 32 are allowed):
https://github.com/hashcat/oclHashcat/blob/master/src/shared.c#L15998
So it seems that hashcat do not care about salt length when using "-m 7600" options, but oclHashcat does for performance reasons.
NeoTherm1c pointed out that there is already md5($salt.md5($str)) algo supported so perhaps sha1($salt.sha1($str)) should be requested.
I gave it a shot, and here is the request: https://github.com/hashcat/oclHashcat/issues/29