thanks all, what i mean is it a direct usage approach of SHA-256 or it's some sort of customized SHA algorithm, if general SHA-2 algorithm there are plenty of resources if not, please point me where i can read more about it.
It's just two rounds of SHA-256, the standard stuff.