Overview
Re-exported from libsecp256k1’s internal SHA-256 implementation rather than linking a separate hash library — this keeps the cryptographic dependency surface to a single audited component. The same implementation backs upstream signing and verification, so hashes produced here are byte-for-byte identical to the ones consumed by secp256k1_schnorrsig_sign_custom, secp256k1_ecdsa_sign, etc.
Topics
Hashing