veyron2/security:  Signature also stores the crypto hash function used to compute the signature.

Motivation is that Java (as well as ssh-agent) hash the payload, so we need to hash again before verifying signatures.

Change-Id: Ie53f9e0f91c78040985fb9ae5181935d727783b6
diff --git a/runtimes/google/security/signer.go b/runtimes/google/security/signer.go
index 9d96754..91e87f1 100644
--- a/runtimes/google/security/signer.go
+++ b/runtimes/google/security/signer.go
@@ -9,6 +9,7 @@
 
 // NewClearSigner creates a Signer that uses the provided private key to sign messages.
 // This private key is kept in the clear in the memory of the running process.
+// No hashing is applied prior to signing.
 func NewClearSigner(key *ecdsa.PrivateKey) security.Signer {
 	return &clearSigner{key}
 }
@@ -23,6 +24,7 @@
 		return
 	}
 	sig.R, sig.S = r.Bytes(), s.Bytes()
+	sig.Hash = security.NoHash
 	return
 }