You already know that you should never roll out your own crypto.
Password Hashing (Key Derivation Functions)
The hash may follow a scheme which encodes the KDF, for example
- 2018 state-of-the-art: Argon2 (not standardised yet).
- CPU, Memory, Parallelism-hard
Entropy is calculated using the password-generation function, not the password!