veyron2/security:  Signature also stores the crypto hash function used to compute the signature.

Motivation is that Java (as well as ssh-agent) hash the payload, so we need to hash again before verifying signatures.

Change-Id: Ie53f9e0f91c78040985fb9ae5181935d727783b6
1 file changed
tree: 1c5ccef20b9ab77d29354e231bc3423180282e25
  1. examples/
  2. lib/
  3. products/
  4. runtimes/
  5. security/
  6. services/
  7. tools/