"x/ref": Use security.[Local/Remote]BlessingNames

CL 8243 depecrated security.BlessingNames and instead
introduced security.[Local/Remote]BlessingNames. This CL
updates the x/ref repo in accordance to this change.

Change-Id: I20e1b691f9941be6a8693e924a47948ec46a1331
diff --git a/examples/rps/rpsbot/impl.go b/examples/rps/rpsbot/impl.go
index 3db881d..a767dfc 100644
--- a/examples/rps/rpsbot/impl.go
+++ b/examples/rps/rpsbot/impl.go
@@ -37,10 +37,10 @@
 
 func (r *RPS) CreateGame(call rpc.ServerCall, opts rps.GameOptions) (rps.GameId, error) {
 	if vlog.V(1) {
-		b, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+		b, _ := security.RemoteBlessingNames(call.Context())
 		vlog.Infof("CreateGame %+v from %v", opts, b)
 	}
-	names, _ := security.BlessingNames(call.Context(), security.CallSideLocal)
+	names := security.LocalBlessingNames(call.Context())
 	if len(names) == 0 {
 		return rps.GameId{}, errors.New("no names provided for context")
 	}
@@ -48,7 +48,7 @@
 }
 
 func (r *RPS) Play(call rps.JudgePlayServerCall, id rps.GameId) (rps.PlayResult, error) {
-	names, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+	names, _ := security.RemoteBlessingNames(call.Context())
 	vlog.VI(1).Infof("Play %+v from %v", id, names)
 	if len(names) == 0 {
 		return rps.PlayResult{}, errors.New("no names provided for context")
@@ -57,14 +57,14 @@
 }
 
 func (r *RPS) Challenge(call rpc.ServerCall, address string, id rps.GameId, opts rps.GameOptions) error {
-	b, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+	b, _ := security.RemoteBlessingNames(call.Context())
 	vlog.VI(1).Infof("Challenge (%q, %+v, %+v) from %v", address, id, opts, b)
 	newctx, _ := vtrace.SetNewTrace(r.ctx)
 	return r.player.challenge(newctx, address, id, opts)
 }
 
 func (r *RPS) Record(call rpc.ServerCall, score rps.ScoreCard) error {
-	b, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+	b, _ := security.RemoteBlessingNames(call.Context())
 	vlog.VI(1).Infof("Record (%+v) from %v", score, b)
 	return r.scoreKeeper.Record(call, score)
 }
diff --git a/examples/rps/rpsbot/scorekeeper.go b/examples/rps/rpsbot/scorekeeper.go
index 1f7e7d7..4c08366 100644
--- a/examples/rps/rpsbot/scorekeeper.go
+++ b/examples/rps/rpsbot/scorekeeper.go
@@ -25,7 +25,7 @@
 }
 
 func (k *ScoreKeeper) Record(call rpc.ServerCall, score rps.ScoreCard) error {
-	b, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+	b, _ := security.RemoteBlessingNames(call.Context())
 	vlog.VI(1).Infof("Received ScoreCard from %v:", b)
 	vlog.VI(1).Info(common.FormatScoreCard(score))
 	k.numRecords.Incr(1)
diff --git a/examples/rps/rpsplayer/main.go b/examples/rps/rpsplayer/main.go
index de34412..5872963 100644
--- a/examples/rps/rpsplayer/main.go
+++ b/examples/rps/rpsplayer/main.go
@@ -73,7 +73,7 @@
 }
 
 func (i *impl) Challenge(call rpc.ServerCall, address string, id rps.GameId, opts rps.GameOptions) error {
-	remote, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+	remote, _ := security.RemoteBlessingNames(call.Context())
 	vlog.VI(1).Infof("Challenge (%q, %+v) from %v", address, id, remote)
 	// When setDecline(true) returns, future challenges will be declined.
 	// Whether the current challenge should be considered depends on the
diff --git a/examples/rps/rpsscorekeeper/main.go b/examples/rps/rpsscorekeeper/main.go
index 653baca..babd0d9 100644
--- a/examples/rps/rpsscorekeeper/main.go
+++ b/examples/rps/rpsscorekeeper/main.go
@@ -25,7 +25,7 @@
 }
 
 func (i *impl) Record(call rpc.ServerCall, score rps.ScoreCard) error {
-	b, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+	b, _ := security.RemoteBlessingNames(call.Context())
 	vlog.VI(1).Infof("Record (%+v) from %v", score, b)
 	i.ch <- score
 	return nil
diff --git a/examples/tunnel/tunneld/impl.go b/examples/tunnel/tunneld/impl.go
index c8c179b..cf0c4f3 100644
--- a/examples/tunnel/tunneld/impl.go
+++ b/examples/tunnel/tunneld/impl.go
@@ -29,7 +29,7 @@
 	if err != nil {
 		return err
 	}
-	b, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+	b, _ := security.RemoteBlessingNames(call.Context())
 	name := fmt.Sprintf("RemoteBlessings:%v LocalAddr:%v RemoteAddr:%v", b, conn.LocalAddr(), conn.RemoteAddr())
 	vlog.Infof("TUNNEL START: %v", name)
 	err = tunnelutil.Forward(conn, call.SendStream(), call.RecvStream())
@@ -38,7 +38,7 @@
 }
 
 func (t *T) Shell(call tunnel.TunnelShellServerCall, command string, shellOpts tunnel.ShellOpts) (int32, error) {
-	b, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+	b, _ := security.RemoteBlessingNames(call.Context())
 	vlog.Infof("SHELL START for %v: %q", b, command)
 	shell, err := findShell()
 	if err != nil {
@@ -109,7 +109,7 @@
 
 	select {
 	case runErr := <-runIOManager(stdin, stdout, stderr, ptyFd, call):
-		b, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+		b, _ := security.RemoteBlessingNames(call.Context())
 		vlog.Infof("SHELL END for %v: %q (%v)", b, command, runErr)
 		return harvestExitcode(c.Process, runErr)
 	case <-call.Context().Done():
diff --git a/profiles/internal/lib/appcycle/appcycle.go b/profiles/internal/lib/appcycle/appcycle.go
index 0a683d4..366a97d 100644
--- a/profiles/internal/lib/appcycle/appcycle.go
+++ b/profiles/internal/lib/appcycle/appcycle.go
@@ -122,7 +122,7 @@
 }
 
 func (d *invoker) Stop(call stub.AppCycleStopServerCall) error {
-	blessings, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+	blessings, _ := security.RemoteBlessingNames(call.Context())
 	vlog.Infof("AppCycle Stop request from %v", blessings)
 	// The size of the channel should be reasonably sized to expect not to
 	// miss updates while we're waiting for the stream to unblock.
diff --git a/profiles/internal/rpc/client.go b/profiles/internal/rpc/client.go
index d107af1..84e8166 100644
--- a/profiles/internal/rpc/client.go
+++ b/profiles/internal/rpc/client.go
@@ -376,7 +376,7 @@
 		status.flow = nil
 		return
 	}
-	status.blessings, status.rejectedBlessings = security.BlessingNames(ctx, security.CallSideRemote)
+	status.blessings, status.rejectedBlessings = security.RemoteBlessingNames(ctx)
 	return
 }
 
diff --git a/profiles/internal/rpc/full_test.go b/profiles/internal/rpc/full_test.go
index 2595fee..dcbcfa9 100644
--- a/profiles/internal/rpc/full_test.go
+++ b/profiles/internal/rpc/full_test.go
@@ -102,8 +102,8 @@
 }
 
 func (*testServer) EchoBlessings(call rpc.ServerCall) (server, client string, _ error) {
-	local, _ := security.BlessingNames(call.Context(), security.CallSideLocal)
-	remote, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+	local := security.LocalBlessingNames(call.Context())
+	remote, _ := security.RemoteBlessingNames(call.Context())
 	return fmt.Sprintf("%v", local), fmt.Sprintf("%v", remote), nil
 }
 
diff --git a/profiles/internal/rpc/server_authorizer.go b/profiles/internal/rpc/server_authorizer.go
index f863b3a..4d12a49 100644
--- a/profiles/internal/rpc/server_authorizer.go
+++ b/profiles/internal/rpc/server_authorizer.go
@@ -66,7 +66,7 @@
 	if call.RemoteBlessings().IsZero() {
 		return verror.New(errNoBlessings, ctx)
 	}
-	serverBlessings, rejectedBlessings := security.BlessingNames(ctx, security.CallSideRemote)
+	serverBlessings, rejectedBlessings := security.RemoteBlessingNames(ctx)
 
 	if !matchedBy(a.patternsFromNameResolution, serverBlessings) {
 		return verror.New(errAuthNoPatternMatch, ctx, serverBlessings, a.patternsFromNameResolution, rejectedBlessings)
diff --git a/profiles/internal/rt/ipc_test.go b/profiles/internal/rt/ipc_test.go
index e35ee5b..f613e3d 100644
--- a/profiles/internal/rt/ipc_test.go
+++ b/profiles/internal/rt/ipc_test.go
@@ -27,7 +27,7 @@
 type testService struct{}
 
 func (testService) EchoBlessings(call rpc.ServerCall) ([]string, error) {
-	b, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+	b, _ := security.RemoteBlessingNames(call.Context())
 	return b, nil
 }
 
diff --git a/profiles/internal/rt/rt_test.go b/profiles/internal/rt/rt_test.go
index 8000b47..3874701 100644
--- a/profiles/internal/rt/rt_test.go
+++ b/profiles/internal/rt/rt_test.go
@@ -98,7 +98,7 @@
 	ctx, cancel := context.RootContext()
 	defer cancel()
 	ctx = security.SetCall(ctx, call)
-	blessings, rejected := security.BlessingNames(ctx, security.CallSideRemote)
+	blessings, rejected := security.RemoteBlessingNames(ctx)
 	if n := len(blessings); n != 1 {
 		return fmt.Errorf("rt.Principal().BlessingStore().Default() return blessings:%v (rejected:%v), want exactly one recognized blessing", blessings, rejected)
 	}
@@ -110,7 +110,7 @@
 	ctx, cancel := context.RootContext()
 	defer cancel()
 	ctx = security.SetCall(ctx, call)
-	b, _ := security.BlessingNames(ctx, security.CallSideRemote)
+	b, _ := security.RemoteBlessingNames(ctx)
 	return b[0]
 }
 
diff --git a/security/agent/pingpong/main.go b/security/agent/pingpong/main.go
index e9a4f41..3547245 100644
--- a/security/agent/pingpong/main.go
+++ b/security/agent/pingpong/main.go
@@ -17,8 +17,8 @@
 type pongd struct{}
 
 func (f *pongd) Ping(call rpc.ServerCall, message string) (result string, err error) {
-	client, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
-	server, _ := security.BlessingNames(call.Context(), security.CallSideLocal)
+	client, _ := security.RemoteBlessingNames(call.Context())
+	server := security.LocalBlessingNames(call.Context())
 	return fmt.Sprintf("pong (client:%v server:%v)", client, server), nil
 }
 
diff --git a/services/mgmt/binary/impl/service.go b/services/mgmt/binary/impl/service.go
index e18290a..4a7dbb1 100644
--- a/services/mgmt/binary/impl/service.go
+++ b/services/mgmt/binary/impl/service.go
@@ -132,7 +132,7 @@
 		return verror.New(ErrOperationFailed, call.Context())
 	}
 
-	rb, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+	rb, _ := security.RemoteBlessingNames(call.Context())
 	if len(rb) == 0 {
 		// None of the client's blessings are valid.
 		return verror.New(ErrNotAuthorized, call.Context())
@@ -399,7 +399,7 @@
 		// can be extended to form one of the local blessings.)
 		tam := make(access.Permissions)
 
-		lb, _ := security.BlessingNames(call.Context(), security.CallSideLocal)
+		lb := security.LocalBlessingNames(call.Context())
 		for _, p := range prefixPatterns(lb) {
 			for _, tag := range access.AllTypicalTags() {
 				tam.Add(p, string(tag))
diff --git a/services/mgmt/device/impl/app_service.go b/services/mgmt/device/impl/app_service.go
index 2d4881a..ad0a09c 100644
--- a/services/mgmt/device/impl/app_service.go
+++ b/services/mgmt/device/impl/app_service.go
@@ -456,7 +456,7 @@
 	// TODO(caprita,rjkroege): Should the installation AccessLists really be
 	// seeded with the device AccessList? Instead, might want to hide the deviceAccessList
 	// from the app?
-	blessings, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+	blessings, _ := security.RemoteBlessingNames(call.Context())
 	if err := i.initializeSubAccessLists(installationDir, blessings, i.deviceAccessList.Copy()); err != nil {
 		return "", err
 	}
@@ -715,7 +715,7 @@
 	if err := saveInstanceInfo(call.Context(), instanceDir, instanceInfo); err != nil {
 		return instanceDir, instanceID, err
 	}
-	blessings, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+	blessings, _ := security.RemoteBlessingNames(call.Context())
 	aclCopy := i.deviceAccessList.Copy()
 	if err := i.initializeSubAccessLists(instanceDir, blessings, aclCopy); err != nil {
 		return instanceDir, instanceID, err
diff --git a/services/mgmt/device/impl/device_service.go b/services/mgmt/device/impl/device_service.go
index 784d029..07b1868 100644
--- a/services/mgmt/device/impl/device_service.go
+++ b/services/mgmt/device/impl/device_service.go
@@ -646,7 +646,7 @@
 func (s *deviceService) ListAssociations(call rpc.ServerCall) (associations []device.Association, err error) {
 	// Temporary code. Dump this.
 	if vlog.V(2) {
-		b, r := security.BlessingNames(call.Context(), security.CallSideRemote)
+		b, r := security.RemoteBlessingNames(call.Context())
 		vlog.Infof("ListAssociations given blessings: %v\n", b)
 		if len(r) > 0 {
 			vlog.Infof("ListAssociations rejected blessings: %v\n", r)
diff --git a/services/mgmt/device/impl/helper_manager.go b/services/mgmt/device/impl/helper_manager.go
index 870be30..0a1a762 100644
--- a/services/mgmt/device/impl/helper_manager.go
+++ b/services/mgmt/device/impl/helper_manager.go
@@ -59,7 +59,7 @@
 // TODO(rjkroege): This code assumes a desktop target and will need
 // to be reconsidered for embedded contexts.
 func (i suidHelperState) usernameForPrincipal(call rpc.ServerCall, uat BlessingSystemAssociationStore) string {
-	identityNames, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+	identityNames, _ := security.RemoteBlessingNames(call.Context())
 	systemName, present := uat.SystemAccountForBlessings(identityNames)
 
 	if present {
diff --git a/services/mgmt/lib/acls/hierarchical_authorizer.go b/services/mgmt/lib/acls/hierarchical_authorizer.go
index 7c0b775..10c3302 100644
--- a/services/mgmt/lib/acls/hierarchical_authorizer.go
+++ b/services/mgmt/lib/acls/hierarchical_authorizer.go
@@ -82,7 +82,7 @@
 
 	// Maybe the invoking principal can invoke this method because
 	// it has root permissions.
-	names, _ := security.BlessingNames(ctx, security.CallSideRemote)
+	names, _ := security.RemoteBlessingNames(ctx)
 	if len(names) > 0 && ha.rootAccessList.Includes(names...) {
 		return nil
 	}
diff --git a/services/mounttable/lib/mounttable.go b/services/mounttable/lib/mounttable.go
index a1b6a34..b1c2bd5 100644
--- a/services/mounttable/lib/mounttable.go
+++ b/services/mounttable/lib/mounttable.go
@@ -173,7 +173,7 @@
 		return nil
 	}
 	// Match client's blessings against the AccessLists.
-	blessings, invalidB := security.BlessingNames(call.Context(), security.CallSideRemote)
+	blessings, invalidB := security.RemoteBlessingNames(call.Context())
 	for _, tag := range tags {
 		if acl, exists := n.acls.GetPermissionsForTag(string(tag)); exists && acl.Includes(blessings...) {
 			return nil
@@ -206,7 +206,7 @@
 		return nil
 	}
 	// Match client's blessings against the AccessLists.
-	blessings, invalidB := security.BlessingNames(call.Context(), security.CallSideRemote)
+	blessings, invalidB := security.RemoteBlessingNames(call.Context())
 	for _, tag := range tags {
 		if acl, exists := n.amTemplate[string(tag)]; exists && expand(&acl, name).Includes(blessings...) {
 			return nil
@@ -225,7 +225,7 @@
 		return nil
 	}
 	acls := cur.acls.Copy()
-	blessings, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+	blessings, _ := security.RemoteBlessingNames(call.Context())
 	for _, b := range blessings {
 		acls.Add(security.BlessingPattern(b), string(mounttable.Admin))
 	}
@@ -423,7 +423,7 @@
 		// No patterns provided in the request, take the conservative
 		// approach and assume that the server being mounted will
 		// present the same blessings as the client calling Mount.
-		blessings, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+		blessings, _ := security.RemoteBlessingNames(call.Context())
 		for _, b := range blessings {
 			patterns = append(patterns, security.BlessingPattern(b))
 		}
diff --git a/services/security/groups/server/group.go b/services/security/groups/server/group.go
index 6b1311d..91960e3 100644
--- a/services/security/groups/server/group.go
+++ b/services/security/groups/server/group.go
@@ -33,7 +33,7 @@
 	}
 	if acl == nil {
 		acl = access.Permissions{}
-		blessings, _ := security.BlessingNames(call.Context(), security.CallSideRemote)
+		blessings, _ := security.RemoteBlessingNames(call.Context())
 		if len(blessings) == 0 {
 			// The blessings presented by the caller do not give it a name for this
 			// operation. We could create a world-accessible group, but it seems safer
diff --git a/services/wsprd/principal/principal_test.go b/services/wsprd/principal/principal_test.go
index 76263ea..4e05fee 100644
--- a/services/wsprd/principal/principal_test.go
+++ b/services/wsprd/principal/principal_test.go
@@ -89,7 +89,7 @@
 			LocalPrincipal:  pOrigin,
 			RemoteBlessings: b,
 			Method:          method}))
-		return security.BlessingNames(ctx, security.CallSideRemote)
+		return security.RemoteBlessingNames(ctx)
 	}
 
 	// Validate the blessings in various contexts.
diff --git a/services/wsprd/rpc/server/server.go b/services/wsprd/rpc/server/server.go
index 491f111..43e390b 100644
--- a/services/wsprd/rpc/server/server.go
+++ b/services/wsprd/rpc/server/server.go
@@ -462,8 +462,8 @@
 	}
 	ctx := call.Context()
 	if includeBlessingStrings {
-		secCall.LocalBlessingStrings, _ = security.BlessingNames(ctx, security.CallSideLocal)
-		secCall.RemoteBlessingStrings, _ = security.BlessingNames(ctx, security.CallSideRemote)
+		secCall.LocalBlessingStrings = security.LocalBlessingNames(ctx)
+		secCall.RemoteBlessingStrings, _ = security.RemoteBlessingNames(ctx)
 	}
 	return secCall
 }