veyron/security: make loadPEMKey support nil encrypted passwords.

Backward compatibility for nil encrypted passwords from old loadPEMKey
function.

Change-Id: Ic0eb4fb082dea33cc1b408ce5b2233668f101da7
diff --git a/security/agent/agentd/main.go b/security/agent/agentd/main.go
index 4ae6e0a..bcabd77 100644
--- a/security/agent/agentd/main.go
+++ b/security/agent/agentd/main.go
@@ -83,8 +83,8 @@
 	if os.IsNotExist(err) {
 		return handleDoesNotExist(dir)
 	}
-	if err == vsecurity.MissingPassphraseErr {
-		return handleMissingPassphrase(dir)
+	if err == vsecurity.PassphraseErr {
+		return handlePassphrase(dir)
 	}
 	return p, err
 }
@@ -99,7 +99,7 @@
 	return p, err
 }
 
-func handleMissingPassphrase(dir string) (security.Principal, error) {
+func handlePassphrase(dir string) (security.Principal, error) {
 	fmt.Println("Private key file is encrypted. Please enter passphrase.")
 	pass, err := gopass.GetPass("Enter passphrase: ")
 	if err != nil {
diff --git a/security/principal.go b/security/principal.go
index ab23b09..2b1f211 100644
--- a/security/principal.go
+++ b/security/principal.go
@@ -47,8 +47,7 @@
 // LoadPersistentPrincipal reads state for a principal (private key, BlessingRoots, BlessingStore)
 // from the provided directory 'dir' and commits all state changes to the same directory.
 // If private key file does not exist then an error 'err' is returned such that os.IsNotExist(err) is true.
-// If private key file exists then 'passphrase' must be non-nil if the contents of the file are encrypted,
-// otherwise a MissingPassphraseErr is returned.
+// If private key file exists then 'passphrase' must be correct, otherwise PassphraseErr will be returned.
 func LoadPersistentPrincipal(dir string, passphrase []byte) (security.Principal, error) {
 	key, err := loadKeyFromDir(dir, passphrase)
 	if err != nil {
diff --git a/security/principal_test.go b/security/principal_test.go
index 467d37a..fd6d05d 100644
--- a/security/principal_test.go
+++ b/security/principal_test.go
@@ -34,9 +34,9 @@
 	if _, err = LoadPersistentPrincipal(dir, incorrect_passphrase); err == nil {
 		t.Errorf("encrypted LoadPersistentPrincipal with incorrect passphrase should fail")
 	}
-	// and return MissingPassphraseError if the passphrase is nil.
-	if _, err = LoadPersistentPrincipal(dir, nil); err != MissingPassphraseErr {
-		t.Errorf("encrypted LoadPersistentPrincipal with nil passphrase should return MissingPassphraseErr: %v", err)
+	// and return PassphraseError if the passphrase is nil.
+	if _, err = LoadPersistentPrincipal(dir, nil); err != PassphraseErr {
+		t.Errorf("encrypted LoadPersistentPrincipal with nil passphrase should return PassphraseErr: %v", err)
 	}
 	os.RemoveAll(dir)
 }
diff --git a/security/util.go b/security/util.go
index 175d49f..b33d7fd 100644
--- a/security/util.go
+++ b/security/util.go
@@ -28,10 +28,9 @@
 	return acl
 }
 
-var MissingPassphraseErr = errors.New("passphrase required for decrypting private key")
+var PassphraseErr = errors.New("passphrase incorrect for decrypting private key")
 
-// loadPEMKey loads a key from 'r'. passphrase should be non-nil if the key held in 'r' is
-// encrypted, otherwise a MissingPassphraseErr will be returned.
+// loadPEMKey loads a key from 'r'. returns PassphraseErr for incorrect Passphrase.
 // If the key held in 'r' is unencrypted, 'passphrase' will be ignored.
 func loadPEMKey(r io.Reader, passphrase []byte) (interface{}, error) {
 	pemBlockBytes, err := ioutil.ReadAll(r)
@@ -44,12 +43,9 @@
 	}
 	var data []byte
 	if x509.IsEncryptedPEMBlock(pemBlock) {
-		if passphrase == nil {
-			return nil, MissingPassphraseErr
-		}
 		data, err = x509.DecryptPEMBlock(pemBlock, passphrase)
 		if err != nil {
-			return nil, err
+			return nil, PassphraseErr
 		}
 	} else {
 		data = pemBlock.Bytes
@@ -57,7 +53,11 @@
 
 	switch pemBlock.Type {
 	case ecPrivateKeyPEMType:
-		return x509.ParseECPrivateKey(data)
+		key, err := x509.ParseECPrivateKey(data)
+		if err != nil {
+			return nil, PassphraseErr
+		}
+		return key, nil
 	}
 	return nil, fmt.Errorf("PEM key block has an unrecognized type: %v", pemBlock.Type)
 }
diff --git a/security/util_test.go b/security/util_test.go
index 117ee68..356f98c 100644
--- a/security/util_test.go
+++ b/security/util_test.go
@@ -61,8 +61,8 @@
 	if err := savePEMKey(&buf, key, pass); err != nil {
 		t.Fatalf("Failed to save ECDSA private key: %v", err)
 	}
-	if loadedKey, err = loadPEMKey(&buf, nil); loadedKey != nil || err != MissingPassphraseErr {
-		t.Fatalf("expected(nil, MissingPassphraseError), instead got (%v, %v)", loadedKey, err)
+	if loadedKey, err = loadPEMKey(&buf, nil); loadedKey != nil || err != PassphraseErr {
+		t.Fatalf("expected(nil, PassphraseError), instead got (%v, %v)", loadedKey, err)
 	}
 }