No.
Concern 1:
Most password hashing libraries will perform a hash recursively 2^n2n times. on Modern On modern systems, they choose 2^828 or higher (resulting in 512 hashes).
While you are using a salt, you're only hashing the password once. This would allow a hacker to create a rainbow table with considerably less effort.
Concern 2:
Also, another concern, ifIf you're creating a random salt everytime, you'll never be able to verify the password. I would pass the salt in (or return the salt with the hash). That, that way the hash is repeatable.