diff --git a/tests/device_tests/reset_recovery/test_reset_bip39_t2.py b/tests/device_tests/reset_recovery/test_reset_bip39_t2.py index 90c86e3d3a..b65ed20883 100644 --- a/tests/device_tests/reset_recovery/test_reset_bip39_t2.py +++ b/tests/device_tests/reset_recovery/test_reset_bip39_t2.py @@ -156,7 +156,7 @@ def test_reset_entropy_check(session: Session): assert IF.mnemonic == expected_mnemonic # Check that the device is properly initialized. - if session.client.protocol_version is ProtocolVersion.PROTOCOL_V1: + if session.client.protocol_version is ProtocolVersion.V1: features = session.call_raw(messages.Initialize()) else: session.refresh_features() diff --git a/tests/device_tests/test_basic.py b/tests/device_tests/test_basic.py index f6ec096502..5d2077f444 100644 --- a/tests/device_tests/test_basic.py +++ b/tests/device_tests/test_basic.py @@ -23,7 +23,7 @@ from trezorlib.debuglink import TrezorClientDebugLink as Client def test_features(client: Client): session = client.get_session() f0 = session.features - if client.protocol_version == ProtocolVersion.PROTOCOL_V1: + if client.protocol_version == ProtocolVersion.V1: # session erases session_id from its features f0.session_id = session.id f1 = session.call(messages.Initialize(session_id=session.id)) diff --git a/tests/device_tests/test_protection_levels.py b/tests/device_tests/test_protection_levels.py index 083e91e93b..9bcb1d57a3 100644 --- a/tests/device_tests/test_protection_levels.py +++ b/tests/device_tests/test_protection_levels.py @@ -64,7 +64,7 @@ def _assert_protection( assert session.client.features.passphrase_protection is passphrase session.lock() # session.end() - if session.protocol_version == ProtocolVersion.PROTOCOL_V1: + if session.protocol_version == ProtocolVersion.V1: new_session = session.client.get_session() return new_session @@ -191,7 +191,7 @@ def test_get_public_key(session: Session): session.client.use_pin_sequence([PIN4]) expected_responses = [_pin_request(session)] - if session.protocol_version == ProtocolVersion.PROTOCOL_V1: + if session.protocol_version == ProtocolVersion.V1: expected_responses.append(messages.PassphraseRequest) expected_responses.append(messages.PublicKey) @@ -205,7 +205,7 @@ def test_get_address(session: Session): with session: session.client.use_pin_sequence([PIN4]) expected_responses = [_pin_request(session)] - if session.protocol_version == ProtocolVersion.PROTOCOL_V1: + if session.protocol_version == ProtocolVersion.V1: expected_responses.append(messages.PassphraseRequest) expected_responses.append(messages.Address) @@ -306,7 +306,7 @@ def test_sign_message(session: Session): expected_responses = [_pin_request(session)] - if session.protocol_version == ProtocolVersion.PROTOCOL_V1: + if session.protocol_version == ProtocolVersion.V1: expected_responses.append(messages.PassphraseRequest) expected_responses.extend( @@ -392,7 +392,7 @@ def test_signtx(session: Session): with session: session.client.use_pin_sequence([PIN4]) expected_responses = [_pin_request(session)] - if session.protocol_version == ProtocolVersion.PROTOCOL_V1: + if session.protocol_version == ProtocolVersion.V1: expected_responses.append(messages.PassphraseRequest) expected_responses.extend( [