114
// Original password should be received from the client, either when setting a password or authenticating the user (comparing the password with the stored hash).
1
// All rights reserved, pituach.dev
2
using System;
3
using System.Linq;
4
using System.Security.Cryptography;
5
using Microsoft.AspNetCore.Cryptography.KeyDerivation;
6
7
public class Program
8
{
9
// Gets a securely randomized salt for us.
10
public static byte[] RandomSalt()
11
{
12
// We securly randomize a long enough salt, 16 bytes should suffice.
13
return RandomNumberGenerator.GetBytes(16);
14
}
15
16
// Computes the hash for the given password.
17
public static byte[] ComputeHash(string password, byte[] salt, int iterations)
18
{
19
// We compute the hash with the given variables, we take 36 bytes from the result, this should suffice.
20
return KeyDerivation.Pbkdf2(password, salt, KeyDerivationPrf.HMACSHA512, iterations, 36);
21
}
22
23
// Slow compares the two given arrays.
24
public static bool SlowEquals(byte[] a, byte[] b)
Cached Result
Checking password P@ssw0rd1, is it valid? True
Checking password 1dr0wss@P, is it valid? False
Checking password 1dr0wss@P, is it valid? False