The length of output of hashing algorithms are not depended on the input. Any input produces same length of output.
From a post in stackoverflow asked by z-boss, and answered by Bill Karwin;
MD5 generates a 128-bit hash value. You can use CHAR(32) or BINARY(16)
SHA-1 generates a 160-bit hash value. You can use CHAR(40) or
BINARY(20)
SHA-224 generates a 224-bit hash value. You can use CHAR(56) or
BINARY(28)
SHA-256 generates a 256-bit hash value. You can use CHAR(64) or
BINARY(32)
SHA-384 generates a 384-bit hash value. You can use CHAR(96) or
BINARY(48)
SHA-512 generates a 512-bit hash value. You can use CHAR(128) or
BINARY(64)
BCrypt generates an implementation-dependent 448-bit hash value. You
might need CHAR(56), CHAR(60), CHAR(76), BINARY(56) or BINARY(60)
Full post is here: https://stackoverflow.com/questions/247304/what-data-type-to-use-for-hashed-password-field-and-what-length
In addition, do not forget to add salt to your passwords(BcryptNet handles salting automatically). Before doing your implementation , I recommend you to read the posts;
How to securely hash passwords?
https://stackoverflow.com/questions/1054022/best-way-to-store-password-in-database