veyron/services/identity: Remove support for the old security model.

And with it, also remove the "identity" tool.

Change-Id: I85a390c1af0f3874be68dfb7e46fb6fdc8ceb567
diff --git a/security/agent/test.sh b/security/agent/test.sh
index 8efeed6..a6961c1 100755
--- a/security/agent/test.sh
+++ b/security/agent/test.sh
@@ -9,12 +9,6 @@
 build() {
   AGENTD_BIN="$(shell_test::build_go_binary 'veyron.io/veyron/veyron/security/agent/agentd')"
   PINGPONG_BIN="$(shell_test::build_go_binary 'veyron.io/veyron/veyron/security/agent/pingpong')"
-  IDENTITY_BIN="$(shell_test::build_go_binary 'veyron.io/veyron/veyron/tools/identity')"
-}
-
-echo_identity() {
-  local -r OUTPUT="$1"
-  "${AGENTD_BIN}" bash -c 'echo ${VEYRON_IDENTITY}' > "${OUTPUT}"
 }
 
 main() {
@@ -30,11 +24,9 @@
   # Test running a single app.
   shell_test::start_server "${PINGPONG_BIN}" --server
   "${AGENTD_BIN}" --v=4 "${PINGPONG_BIN}" || shell_test::fail "line ${LINENO}: failed to run pingpong"
-  local -r OUTPUT=$(shell::tmp_file)
-  RESULT=$(shell::check_result echo_identity "${OUTPUT}")
-  shell_test::assert_eq "${RESULT}" "0" "${LINENO}"
-  if [[ ! -s "${OUTPUT}" ]]; then
-      shell_test::fail "line ${LINENO}: credentials preserved"
+  local -r CREDENTIALS_UNDER_AGENT=$("${AGENTD_BIN}" bash -c 'echo ${VEYRON_CREDENTIALS}')
+  if [[ "${CREDENTIALS_UNDER_AGENT}" != "" ]]; then
+      shell_test::fail "line ${LINENO}: VEYRON_CREDENTIALS should not be set when running under the agent(${CREDENTIALS_UNDER_AGENT})"
   fi
 
   # Test running multiple apps connecting to the same agent.