57
1
// All rights reserved, pituach.dev
2
using System;
3
using System.Security.Cryptography;
4
using Microsoft.AspNetCore.Cryptography.KeyDerivation;
5
6
public class Program
7
{
8
// Gets a securely randomized salt for us.
9
public static byte[] RandomSalt()
10
{
11
// We securly randomize a long enough salt, 16 bytes should suffice.
12
return RandomNumberGenerator.GetBytes(16);
13
}
14
15
// Computes the hash for the given password.
16
public static byte[] ComputeHash(string password, byte[] salt, int iterations)
17
{
18
// We compute the hash with the given variables, we take 36 bytes from the result, this should suffice.
19
return KeyDerivation.Pbkdf2(password, salt, KeyDerivationPrf.HMACSHA512, iterations, 36);
20
}
21
22
// Slow compares the two given arrays.
23
public static bool SlowEquals(byte[] a, byte[] b)
24
{
Cached Result
Checking password P@ssw0rd1, is it valid? True
Checking password 1dr0wss@P, is it valid? False
Checking password 1dr0wss@P, is it valid? False