You already know that you should never roll out your own crypto.
The hash may follow a scheme which encodes the KDF, for example
- 2018 state-of-the-art: Argon2 (not standardised yet).
- CPU, Memory, Parallelism-hard
Passwords are low-entropy data; you need to slow down attackers with access to vash parallel computation.
Designed to be fast while guaranteeing no collisions and no way of reversing the hash.
These are suitable for file integrity, message authentication, inputs for cryptographic signatures.
There is yet another category of hasing functions used for dictionaries/hash tables :)
Entropy is calculated using the password-generation function, not the password!