Please do not implement auth stuff yourself. And if you do, do not ever write something like this:
if (passwordHash == hash(passwortInput)) ...
this is prone to timing attacks and a few other things. Use a save way to compare things using a crypto library helper function of your choice.
@bitboxer If it's properly hashed, do you still expect bits to leak through the timing of the comparison?