fix(cot-dt2c): use processed Device Tree source file as input

Update the test files to eliminate the use of preprocessor macros,
as the tool now requires processed output. The documentation has
also been revised accordingly.

Additionally, remove the Device Tree Source test files that were
added to test the #ifdef conditions.

Change-Id: I13a682db20e5e44170fc25a2e2dbedd45b9c7321
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
diff --git a/changelog.yaml b/changelog.yaml
index df0476f..dbbff99 100644
--- a/changelog.yaml
+++ b/changelog.yaml
@@ -1450,6 +1450,9 @@
       - title: Transfer List Compiler
         scope: tlc
 
+      - title: Chain of Trust device tree to C source file
+        scope: cot-dt2c
+
   - title: Dependencies
     scope: deps
 
diff --git a/docs/tools/cot-dt2c.rst b/docs/tools/cot-dt2c.rst
index 7b7e56f..e8bb1ac 100644
--- a/docs/tools/cot-dt2c.rst
+++ b/docs/tools/cot-dt2c.rst
@@ -13,23 +13,15 @@
 #. Python (3.8 or later)
 #. `Poetry`_ Python package manager
 
-
 Getting Started
 ~~~~~~~~~~~~~~~
 
-#. Install the tool
-
-    .. code::
-
-        make install
-
+``cot-dt2c`` is installed by default with TF-A's poetry environment. All of it's
+dependencies are listed in `tools/cot_dt2c/pyproject.toml`_.
 
-#. Verify that the tool runs correctly
-
-    .. code::
-
-        make test
-
+``cot-dt2c`` requires a standard DTS file without #ifdef, macros, or other
+preprocessor directives. Therefore, you need to provide a preprocessed device
+tree source(DTS) as input to the tool.
 
 #. Usage of the tool
 
@@ -53,29 +45,6 @@
         visualize-cot
         validate-dt
 
-#. Uninstall the tool
-    .. code::
-
-        make uninstall
-
-    This command will uninstall the tool
-
-
-#. Uninstall the tool and clean all the build file
-    .. code::
-
-        make clean
-
-    This command will clean all the build file and implicitly uninstall the tool
-
-
-#. Call the make file from TF-A root directory
-    .. code::
-
-        make -C tools/cot-dt2c install
-        make -C tools/cot-dt2c uninstall
-        make -C tools/cot-dt2c clean
-
 Convert CoT descriptors to C file
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
@@ -88,7 +57,7 @@
 
 .. code::
 
-    cot-dt2c convert-to-c [INPUT DTB PATH] [OUTPUT C PATH]
+    cot-dt2c convert-to-c [INPUT DTS PATH] [OUTPUT C PATH]
     cot-dt2c convert-to-c fdts/tbbr_cot_descriptors.dtsi test.c
 
 
@@ -111,7 +80,7 @@
 
 .. code::
 
-    cot-dt2c validate-cot [INPUT DTB PATH]
+    cot-dt2c validate-cot [INPUT DTS PATH]
     cot-dt2c validate-cot fdts/tbbr_cot_descriptors.dtsi
 
 
@@ -123,7 +92,7 @@
 
 .. code::
 
-    cot-dt2c visualize-cot [INPUT DTB PATH]
+    cot-dt2c visualize-cot [INPUT DTS PATH]
     cot-dt2c visualize-cot fdts/tbbr_cot_descriptors.dtsi
 
 
@@ -146,4 +115,5 @@
 
 *Copyright (c) 2024, Arm Limited. All rights reserved.*
 
+.. _tools/cot_dt2c/pyproject.toml: https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/refs/heads/integration/tools/cot_dt2c/pyproject.toml
 .. _Poetry: https://python-poetry.org/docs/
diff --git a/tools/cot_dt2c/tests/test_invalid_bracket.dtsi b/tools/cot_dt2c/tests/test_invalid_bracket.dtsi
index ec5f9c7..9752ecf 100644
--- a/tools/cot_dt2c/tests/test_invalid_bracket.dtsi
+++ b/tools/cot_dt2c/tests/test_invalid_bracket.dtsi
@@ -8,21 +8,18 @@
  *
  */
 
-#include <example/example.h>
-#include <example/example/example.h>
-
 cot {
 	manifests {
 		compatible = "arm, cert-descs";
 
 		example_cert: example_cert {
 			root-certificate;
-			image-id =<EXAMPLE_ID>;
+			image-id =<2>;
 			antirollback-counter = <&example_ctr>;
 
 			example_hash: example_hash
 			{
-				oid = EXAMPLE_HASH_ID;
+				oid = "1.3.6.1.4.1.4128.2100.101";
 			};
 
 		};
@@ -32,7 +29,7 @@
 		compatible = "arm, img-descs";
 
 		example {
-			image-id = <EXAMPLE_ID>;
+			image-id = <2>;
 			parent = <&example_cert>;
 			hash = <&example_hash>;
 		};
@@ -45,13 +42,13 @@
 	#size-cells = <0>;
 
 	example_ctr: example_ctr {
-		id  = <TRUSTED_NV_CTR_ID>;
-		oid = CCA_FW_NVCOUNTER_OID;
+		id  = <0>;
+		oid = "1.3.6.1.4.1.4128.2100.3";
 	};
 };
 
 rot_keys {
 	example_pk: example_pk {
-		oid = EXAMPLE_PK_OID;
+		oid = "1.3.6.1.4.1.4128.2100.101";
 	};
 };
diff --git a/tools/cot_dt2c/tests/test_invalid_ifdef.dtsi b/tools/cot_dt2c/tests/test_invalid_ifdef.dtsi
deleted file mode 100644
index 5bc6bb9..0000000
--- a/tools/cot_dt2c/tests/test_invalid_ifdef.dtsi
+++ /dev/null
@@ -1,59 +0,0 @@
-/*
- * Copyright (c) 2024, Arm Limited. All rights reserved.
- *
- * SPDX-License-Identifier: BSD-3-Clause
- *
- * This file provide a malformed CoT DT file that there is
- * unmatching ifdef macro
- *
- */
-
-#include <example/example.h>
-#include <example/example/example.h>
-
-cot {
-	manifests {
-		compatible = "arm, cert-descs";
-
-		example_cert: example_cert {
-			root-certificate;
-			image-id =<EXAMPLE_ID>;
-			antirollback-counter = <&example_ctr>;
-
-			example_hash: example_hash
-			{
-				oid = EXAMPLE_HASH_ID;
-			};
-
-		};
-	};
-
-#if defined(test)
-	images {
-		compatible = "arm, img-descs";
-
-		example {
-			image-id = <EXAMPLE_ID>;
-			parent = <&example_cert>;
-			hash = <&example_hash>;
-		};
-	};
-};
-
-non_volatile_counters: non_volatile_counters {
-	compatible = "arm, non-volatile-counter";
-
-	#address-cells = <1>;
-	#size-cells = <0>;
-
-	example_ctr: example_ctr {
-		id  = <TRUSTED_NV_CTR_ID>;
-		oid = CCA_FW_NVCOUNTER_OID;
-	};
-};
-
-rot_keys {
-	example_pk: example_pk {
-		oid = EXAMPLE_PK_OID;
-	};
-};
diff --git a/tools/cot_dt2c/tests/test_invalid_ifdef2.dtsi b/tools/cot_dt2c/tests/test_invalid_ifdef2.dtsi
deleted file mode 100644
index c915168..0000000
--- a/tools/cot_dt2c/tests/test_invalid_ifdef2.dtsi
+++ /dev/null
@@ -1,61 +0,0 @@
-/*
- * Copyright (c) 2024, Arm Limited. All rights reserved.
- *
- * SPDX-License-Identifier: BSD-3-Clause
- *
- * This file provide a malformed CoT DT file that there is
- * unmatching ifdef macro
- *
- */
-
-#include <example/example.h>
-#include <example/example/example.h>
-
-cot {
-	manifests {
-		compatible = "arm, cert-descs";
-
-		example_cert: example_cert {
-			root-certificate;
-			image-id =<EXAMPLE_ID>;
-			antirollback-counter = <&example_ctr>;
-
-			example_hash: example_hash
-			{
-				oid = EXAMPLE_HASH_ID;
-			};
-
-		};
-	};
-
-#if defined(test)
-	images {
-		compatible = "arm, img-descs";
-
-		example {
-			image-id = <EXAMPLE_ID>;
-			parent = <&example_cert>;
-			hash = <&example_hash>;
-		};
-	};
-#endif
-#endif
-};
-
-non_volatile_counters: non_volatile_counters {
-	compatible = "arm, non-volatile-counter";
-
-	#address-cells = <1>;
-	#size-cells = <0>;
-
-	example_ctr: example_ctr {
-		id  = <TRUSTED_NV_CTR_ID>;
-		oid = CCA_FW_NVCOUNTER_OID;
-	};
-};
-
-rot_keys {
-	example_pk: example_pk {
-		oid = EXAMPLE_PK_OID;
-	};
-};
diff --git a/tools/cot_dt2c/tests/test_invalid_missing_attribute.dtsi b/tools/cot_dt2c/tests/test_invalid_missing_attribute.dtsi
index 9c0a5f2..e35ab73 100644
--- a/tools/cot_dt2c/tests/test_invalid_missing_attribute.dtsi
+++ b/tools/cot_dt2c/tests/test_invalid_missing_attribute.dtsi
@@ -8,10 +8,6 @@
  *
  */
 
-#include <tools_share/cca_oid.h>
-#include <common/tbbr/tbbr_img_def.h>
-#include <common/nv_cntr_ids.h>
-
 cot {
 	manifests {
 		compatible = "arm, cert-descs";
@@ -20,218 +16,63 @@
 			root-certificate;
 			antirollback-counter = <&cca_nv_ctr>;
 
-			tb_fw_hash: tb_fw_hash {
-				oid = TRUSTED_BOOT_FW_HASH_OID;
-			};
-			tb_fw_config_hash: tb_fw_config_hash {
-				oid = TRUSTED_BOOT_FW_CONFIG_HASH_OID;
-			};
 			hw_config_hash: hw_config_hash {
 			};
-			fw_config_hash: fw_config_hash {
-				oid = FW_CONFIG_HASH_OID;
-			};
-			soc_fw_hash: soc_fw_hash {
-				oid = SOC_AP_FW_HASH_OID;
-			};
-			soc_fw_config_hash: soc_fw_config_hash {
-				oid = SOC_FW_CONFIG_HASH_OID;
-			};
-			rmm_hash: rmm_hash {
-				oid = RMM_HASH_OID;
-			};
-		};
-
-		core_swd_key_cert: core_swd_key_cert {
-			root-certificate;
-			image-id = <CORE_SWD_KEY_CERT_ID>;
-			signing-key = <&swd_rot_pk>;
-			antirollback-counter = <&trusted_nv_ctr>;
-
-			core_swd_pk: core_swd_pk {
-				oid = CORE_SWD_PK_OID;
-			};
-		};
-
-		trusted_os_fw_content_cert: trusted_os_fw_content_cert {
-			image-id = <TRUSTED_OS_FW_CONTENT_CERT_ID>;
-			parent = <&core_swd_key_cert>;
-			signing-key = <&core_swd_pk>;
-			antirollback-counter = <&trusted_nv_ctr>;
 
-			tos_fw_hash: tos_fw_hash {
-				oid = TRUSTED_OS_FW_HASH_OID;
-			};
-			tos_fw_config_hash: tos_fw_config_hash {
-				oid = TRUSTED_OS_FW_CONFIG_HASH_OID;
+			soc_fw_config_hash: soc_fw_config_hash {
+				oid = "1.3.6.1.4.1.4128.2100.604";
 			};
 		};
 
 		plat_key_cert: plat_key_cert {
 			root-certificate;
-			image-id = <PLAT_KEY_CERT_ID>;
+			image-id = <38>;
 			signing-key = <&prot_pk>;
 			antirollback-counter = <&non_trusted_nv_ctr>;
 
 			plat_pk: plat_pk {
-				oid = PLAT_PK_OID;
+				oid = "1.3.6.1.4.1.4128.2100.1105";
 			};
 		};
 
 		non_trusted_fw_content_cert: non_trusted_fw_content_cert {
-			image-id = <NON_TRUSTED_FW_CONTENT_CERT_ID>;
-			parent = <&plat_key_cert>;
+			image-id = <15>;
 			signing-key = <&plat_pk>;
 			antirollback-counter = <&non_trusted_nv_ctr>;
 
 			nt_world_bl_hash: nt_world_bl_hash {
-				oid = NON_TRUSTED_WORLD_BOOTLOADER_HASH_OID;
+				oid = "1.3.6.1.4.1.4128.2100.1201";
 			};
 			nt_fw_config_hash: nt_fw_config_hash {
-				oid = NON_TRUSTED_FW_CONFIG_HASH_OID;
-			};
-		};
-
-#if defined(SPD_spmd)
-		sip_sp_content_cert: sip_sp_content_cert {
-			image-id = <SIP_SP_CONTENT_CERT_ID>;
-			parent = <&core_swd_key_cert>;
-			signing-key = <&core_swd_pk>;
-			antirollback-counter = <&trusted_nv_ctr>;
-
-			sp_pkg1_hash: sp_pkg1_hash {
-				oid = SP_PKG1_HASH_OID;
-			};
-			sp_pkg2_hash: sp_pkg2_hash {
-				oid = SP_PKG2_HASH_OID;
-			};
-			sp_pkg3_hash: sp_pkg3_hash {
-				oid = SP_PKG3_HASH_OID;
-			};
-			sp_pkg4_hash: sp_pkg4_hash {
-				oid = SP_PKG4_HASH_OID;
-			};
-		};
-
-		plat_sp_content_cert: plat_sp_content_cert {
-			parent = <&plat_key_cert>;
-			signing-key = <&plat_pk>;
-			antirollback-counter = <&non_trusted_nv_ctr>;
-
-			sp_pkg5_hash: sp_pkg5_hash {
-				oid = SP_PKG5_HASH_OID;
-			};
-			sp_pkg6_hash: sp_pkg6_hash {
-				oid = SP_PKG6_HASH_OID;
-			};
-			sp_pkg7_hash: sp_pkg7_hash {
-				oid = SP_PKG7_HASH_OID;
-			};
-			sp_pkg8_hash: sp_pkg8_hash {
-				oid = SP_PKG8_HASH_OID;
+				oid =  "1.3.6.1.4.1.4128.2100.1202";
 			};
 		};
-#endif
-	};
 
 	images {
 		compatible = "arm, img-descs";
 
 		hw_config {
-			image-id = <HW_CONFIG_ID>;
+			image-id = <23>;
 			hash = <&hw_config_hash>;
 		};
 
-		bl31_image {
-			image-id = <BL31_IMAGE_ID>;
-			parent = <&cca_content_cert>;
-			hash = <&soc_fw_hash>;
-		};
-
 		soc_fw_config {
-			image-id = <SOC_FW_CONFIG_ID>;
+			image-id = <25>;
 			parent = <&cca_content_cert>;
 			hash = <&soc_fw_config_hash>;
 		};
 
-		rmm_image {
-			image-id = <RMM_IMAGE_ID>;
-			parent = <&cca_content_cert>;
-			hash = <&rmm_hash>;
-		};
-
-		bl32_image {
-			image-id = <BL32_IMAGE_ID>;
-			parent = <&trusted_os_fw_content_cert>;
-			hash = <&tos_fw_hash>;
-		};
-
-		tos_fw_config {
-			image-id = <TOS_FW_CONFIG_ID>;
-			parent = <&trusted_os_fw_content_cert>;
-			hash = <&tos_fw_config_hash>;
-		};
-
 		bl33_image {
-			image-id = <BL33_IMAGE_ID>;
+			image-id = <5>;
 			parent = <&non_trusted_fw_content_cert>;
 			hash = <&nt_world_bl_hash>;
 		};
 
 		nt_fw_config {
-			image-id = <NT_FW_CONFIG_ID>;
+			image-id = <27>;
 			parent = <&non_trusted_fw_content_cert>;
 			hash = <&nt_fw_config_hash>;
 		};
-
-#if defined(SPD_spmd)
-		sp_pkg1 {
-			parent = <&sip_sp_content_cert>;
-			hash = <&sp_pkg1_hash>;
-		};
-
-		sp_pkg2 {
-			image-id = <SP_PKG2_ID>;
-			parent = <&sip_sp_content_cert>;
-			hash = <&sp_pkg2_hash>;
-		};
-
-		sp_pkg3 {
-			image-id = <SP_PKG3_ID>;
-			parent = <&sip_sp_content_cert>;
-			hash = <&sp_pkg3_hash>;
-		};
-
-		sp_pkg4 {
-			image-id = <SP_PKG4_ID>;
-			parent = <&sip_sp_content_cert>;
-			hash = <&sp_pkg4_hash>;
-		};
-
-		sp_pkg5 {
-			image-id = <SP_PKG5_ID>;
-			parent = <&plat_sp_content_cert>;
-			hash = <&sp_pkg5_hash>;
-		};
-
-		sp_pkg6 {
-			image-id = <SP_PKG6_ID>;
-			parent = <&plat_sp_content_cert>;
-			hash = <&sp_pkg6_hash>;
-		};
-
-		sp_pkg7 {
-			image-id = <SP_PKG7_ID>;
-			parent = <&plat_sp_content_cert>;
-			hash = <&sp_pkg7_hash>;
-		};
-
-		sp_pkg8 {
-			image-id = <SP_PKG8_ID>;
-			parent = <&plat_sp_content_cert>;
-			hash = <&sp_pkg8_hash>;
-		};
-#endif
 	};
 };
 
@@ -242,26 +83,26 @@
 	#size-cells = <0>;
 
 	cca_nv_ctr: cca_nv_ctr {
-		id  = <TRUSTED_NV_CTR_ID>;
-		oid = CCA_FW_NVCOUNTER_OID;
+		id  = <0>;
+		oid = "1.3.6.1.4.1.4128.2100.3";
 	};
 
 	trusted_nv_ctr: trusted_nv_ctr {
-		id  = <TRUSTED_NV_CTR_ID>;
-		oid = TRUSTED_FW_NVCOUNTER_OID;
+		id  = <0>;
+		oid = "1.3.6.1.4.1.4128.2100.1";
 	};
 
 	non_trusted_nv_ctr: non_trusted_nv_ctr {
-		id  = <NON_TRUSTED_NV_CTR_ID>;
-		oid = NON_TRUSTED_FW_NVCOUNTER_OID;
+		id  = <1>;
+		oid = "1.3.6.1.4.1.4128.2100.2";
 	};
 };
 
 rot_keys {
 	swd_rot_pk: swd_rot_pk {
-		oid = SWD_ROT_PK_OID;
+		oid = "1.3.6.1.4.1.4128.2100.1103";
 	};
 	prot_pk: prot_pk {
-		oid = PROT_PK_OID;
+		oid = "1.3.6.1.4.1.4128.2100.1102";
 	};
 };
diff --git a/tools/cot_dt2c/tests/test_invalid_missing_attribute2.dtsi b/tools/cot_dt2c/tests/test_invalid_missing_attribute2.dtsi
deleted file mode 100644
index 01b2597..0000000
--- a/tools/cot_dt2c/tests/test_invalid_missing_attribute2.dtsi
+++ /dev/null
@@ -1,269 +0,0 @@
-/*
- * Copyright (c) 2024, Arm Limited. All rights reserved.
- *
- * SPDX-License-Identifier: BSD-3-Clause
- *
- * This file provide a malformed CoT DT file that there
- * are image/certificate that points to invalid parent
- *
- */
-
-#include <tools_share/cca_oid.h>
-#include <common/tbbr/tbbr_img_def.h>
-#include <common/nv_cntr_ids.h>
-
-cot {
-	manifests {
-		compatible = "arm, cert-descs";
-
-		cca_content_cert: cca_content_cert {
-			root-certificate;
-			image-id =<CCA_CONTENT_CERT_ID>;
-			antirollback-counter = <&cca_nv_ctr>;
-
-			tb_fw_hash: tb_fw_hash {
-				oid = TRUSTED_BOOT_FW_HASH_OID;
-			};
-			tb_fw_config_hash: tb_fw_config_hash {
-				oid = TRUSTED_BOOT_FW_CONFIG_HASH_OID;
-			};
-			hw_config_hash: hw_config_hash {
-				oid = HW_CONFIG_HASH_OID;
-			};
-			fw_config_hash: fw_config_hash {
-				oid = FW_CONFIG_HASH_OID;
-			};
-			soc_fw_hash: soc_fw_hash {
-				oid = SOC_AP_FW_HASH_OID;
-			};
-			soc_fw_config_hash: soc_fw_config_hash {
-				oid = SOC_FW_CONFIG_HASH_OID;
-			};
-			rmm_hash: rmm_hash {
-				oid = RMM_HASH_OID;
-			};
-		};
-
-		core_swd_key_cert: core_swd_key_cert {
-			root-certificate;
-			image-id = <CORE_SWD_KEY_CERT_ID>;
-			signing-key = <&swd_rot_pk>;
-			antirollback-counter = <&trusted_nv_ctr>;
-
-			core_swd_pk: core_swd_pk {
-				oid = CORE_SWD_PK_OID;
-			};
-		};
-
-		trusted_os_fw_content_cert: trusted_os_fw_content_cert {
-			image-id = <TRUSTED_OS_FW_CONTENT_CERT_ID>;
-			parent = <&core_swd_key_cert>;
-			signing-key = <&core_swd_pk>;
-			antirollback-counter = <&trusted_nv_ctr>;
-
-			tos_fw_hash: tos_fw_hash {
-				oid = TRUSTED_OS_FW_HASH_OID;
-			};
-			tos_fw_config_hash: tos_fw_config_hash {
-				oid = TRUSTED_OS_FW_CONFIG_HASH_OID;
-			};
-		};
-
-		plat_key_cert: plat_key_cert {
-			root-certificate;
-			image-id = <PLAT_KEY_CERT_ID>;
-			signing-key = <&prot_pk>;
-			antirollback-counter = <&non_trusted_nv_ctr>;
-
-			plat_pk: plat_pk {
-				oid = PLAT_PK_OID;
-			};
-		};
-
-		non_trusted_fw_content_cert: non_trusted_fw_content_cert {
-			image-id = <NON_TRUSTED_FW_CONTENT_CERT_ID>;
-			parent = <&cca_content_cert>;
-			signing-key = <&plat_pk>;
-			antirollback-counter = <&non_trusted_nv_ctr>;
-
-			nt_world_bl_hash: nt_world_bl_hash {
-				oid = NON_TRUSTED_WORLD_BOOTLOADER_HASH_OID;
-			};
-			nt_fw_config_hash: nt_fw_config_hash {
-				oid = NON_TRUSTED_FW_CONFIG_HASH_OID;
-			};
-		};
-
-#if defined(SPD_spmd)
-		sip_sp_content_cert: sip_sp_content_cert {
-			image-id = <SIP_SP_CONTENT_CERT_ID>;
-			parent = <&cca_content_cert>;
-			signing-key = <&core_swd_pk>;
-			antirollback-counter = <&trusted_nv_ctr>;
-
-			sp_pkg1_hash: sp_pkg1_hash {
-				oid = SP_PKG1_HASH_OID;
-			};
-			sp_pkg2_hash: sp_pkg2_hash {
-				oid = SP_PKG2_HASH_OID;
-			};
-			sp_pkg3_hash: sp_pkg3_hash {
-				oid = SP_PKG3_HASH_OID;
-			};
-			sp_pkg4_hash: sp_pkg4_hash {
-				oid = SP_PKG4_HASH_OID;
-			};
-		};
-
-		plat_sp_content_cert: plat_sp_content_cert {
-			image-id = <PLAT_SP_CONTENT_CERT_ID>;
-			signing-key = <&plat_pk>;
-			antirollback-counter = <&non_trusted_nv_ctr>;
-
-			sp_pkg5_hash: sp_pkg5_hash {
-				oid = SP_PKG5_HASH_OID;
-			};
-			sp_pkg6_hash: sp_pkg6_hash {
-				oid = SP_PKG6_HASH_OID;
-			};
-			sp_pkg7_hash: sp_pkg7_hash {
-				oid = SP_PKG7_HASH_OID;
-			};
-			sp_pkg8_hash: sp_pkg8_hash {
-				oid = SP_PKG8_HASH_OID;
-			};
-		};
-#endif
-	};
-
-	images {
-		compatible = "arm, img-descs";
-
-		hw_config {
-			image-id = <HW_CONFIG_ID>;
-			parent = <&cca_content_cert>;
-			hash = <&hw_config_hash>;
-		};
-
-		bl31_image {
-			image-id = <BL31_IMAGE_ID>;
-			parent = <&cca_content_cert>;
-			hash = <&soc_fw_hash>;
-		};
-
-		soc_fw_config {
-			image-id = <SOC_FW_CONFIG_ID>;
-			parent = <&cca_content_cert>;
-			hash = <&soc_fw_config_hash>;
-		};
-
-		rmm_image {
-			image-id = <RMM_IMAGE_ID>;
-			parent = <&cca_content_cert>;
-			hash = <&rmm_hash>;
-		};
-
-		bl32_image {
-			image-id = <BL32_IMAGE_ID>;
-			parent = <&trusted_os_fw_content_cert>;
-			hash = <&tos_fw_hash>;
-		};
-
-		tos_fw_config {
-			image-id = <TOS_FW_CONFIG_ID>;
-			parent = <&trusted_os_fw_content_cert>;
-			hash = <&tos_fw_config_hash>;
-		};
-
-		bl33_image {
-			image-id = <BL33_IMAGE_ID>;
-			parent = <&non_trusted_fw_content_cert>;
-			hash = <&nt_world_bl_hash>;
-		};
-
-		nt_fw_config {
-			image-id = <NT_FW_CONFIG_ID>;
-			hash = <&nt_fw_config_hash>;
-		};
-
-#if defined(SPD_spmd)
-		sp_pkg1 {
-			image-id = <SP_PKG1_ID>;
-			hash = <&sp_pkg1_hash>;
-		};
-
-		sp_pkg2 {
-			image-id = <SP_PKG2_ID>;
-			parent = <&sip_sp_content_cert>;
-			hash = <&sp_pkg2_hash>;
-		};
-
-		sp_pkg3 {
-			image-id = <SP_PKG3_ID>;
-			parent = <&sip_sp_content_cert>;
-			hash = <&sp_pkg3_hash>;
-		};
-
-		sp_pkg4 {
-			image-id = <SP_PKG4_ID>;
-			parent = <&sip_sp_content_cert>;
-			hash = <&sp_pkg4_hash>;
-		};
-
-		sp_pkg5 {
-			image-id = <SP_PKG5_ID>;
-			parent = <&plat_sp_content_cert>;
-			hash = <&sp_pkg5_hash>;
-		};
-
-		sp_pkg6 {
-			image-id = <SP_PKG6_ID>;
-			parent = <&wrong_parent>;
-			hash = <&sp_pkg6_hash>;
-		};
-
-		sp_pkg7 {
-			image-id = <SP_PKG7_ID>;
-			parent = <&plat_sp_content_cert>;
-			hash = <&sp_pkg7_hash>;
-		};
-
-		sp_pkg8 {
-			image-id = <SP_PKG8_ID>;
-			parent = <&plat_sp_content_cert>;
-			hash = <&sp_pkg8_hash>;
-		};
-#endif
-	};
-};
-
-non_volatile_counters: non_volatile_counters {
-	compatible = "arm, non-volatile-counter";
-
-	#address-cells = <1>;
-	#size-cells = <0>;
-
-	cca_nv_ctr: cca_nv_ctr {
-		id  = <TRUSTED_NV_CTR_ID>;
-		oid = CCA_FW_NVCOUNTER_OID;
-	};
-
-	trusted_nv_ctr: trusted_nv_ctr {
-		id  = <TRUSTED_NV_CTR_ID>;
-		oid = TRUSTED_FW_NVCOUNTER_OID;
-	};
-
-	non_trusted_nv_ctr: non_trusted_nv_ctr {
-		id  = <NON_TRUSTED_NV_CTR_ID>;
-		oid = NON_TRUSTED_FW_NVCOUNTER_OID;
-	};
-};
-
-rot_keys {
-	swd_rot_pk: swd_rot_pk {
-		oid = SWD_ROT_PK_OID;
-	};
-	prot_pk: prot_pk {
-		oid = PROT_PK_OID;
-	};
-};
diff --git a/tools/cot_dt2c/tests/test_invalid_missing_ctr.dtsi b/tools/cot_dt2c/tests/test_invalid_missing_ctr.dtsi
index 5958f5d..c572b1a 100644
--- a/tools/cot_dt2c/tests/test_invalid_missing_ctr.dtsi
+++ b/tools/cot_dt2c/tests/test_invalid_missing_ctr.dtsi
@@ -9,22 +9,19 @@
  *
  */
 
-#include <example/example.h>
-#include <example/example/example.h>
-
 cot {
 	manifests {
 		compatible = "arm, cert-descs";
 
 		example_cert: example_cert {
 			root-certificate;
-			image-id =<EXAMPLE_ID>;
+			image-id =<2>;
 			signing-key = <&swd_rot_pk>;
 			antirollback-counter = <&example_ctr>;
 
 			example_hash: example_hash
 			{
-				oid = EXAMPLE_HASH_ID;
+				oid = "1.3.6.1.4.1.4128.2100.104";
 			};
 
 		};
@@ -34,7 +31,7 @@
 		compatible = "arm, img-descs";
 
 		example {
-			image-id = <EXAMPLE_ID>;
+			image-id = <2>;
 			parent = <&example_cert>;
 			hash = <&example_hash>;
 		};
@@ -51,6 +48,6 @@
 
 rot_keys {
 	example_pk: example_pk {
-		oid = EXAMPLE_PK_OID;
+		oid = "1.3.6.1.4.1.4128.2100.104";
 	};
 };
diff --git a/tools/cot_dt2c/tests/test_invalid_undefined_parent.dtsi b/tools/cot_dt2c/tests/test_invalid_undefined_parent.dtsi
index b761beb..b6056ca 100644
--- a/tools/cot_dt2c/tests/test_invalid_undefined_parent.dtsi
+++ b/tools/cot_dt2c/tests/test_invalid_undefined_parent.dtsi
@@ -8,75 +8,31 @@
  *
  */
 
-#include <tools_share/cca_oid.h>
-#include <common/tbbr/tbbr_img_def.h>
-#include <common/nv_cntr_ids.h>
-
 cot {
 	manifests {
 		compatible = "arm, cert-descs";
 
 		cca_content_cert: cca_content_cert {
 			root-certificate;
-			image-id =<CCA_CONTENT_CERT_ID>;
+			image-id =<36>;
 			antirollback-counter = <&cca_nv_ctr>;
 
-			tb_fw_hash: tb_fw_hash {
-				oid = TRUSTED_BOOT_FW_HASH_OID;
-			};
-			tb_fw_config_hash: tb_fw_config_hash {
-				oid = TRUSTED_BOOT_FW_CONFIG_HASH_OID;
-			};
 			hw_config_hash: hw_config_hash {
-				oid = HW_CONFIG_HASH_OID;
-			};
-			fw_config_hash: fw_config_hash {
-				oid = FW_CONFIG_HASH_OID;
-			};
-			soc_fw_hash: soc_fw_hash {
-				oid = SOC_AP_FW_HASH_OID;
+				oid = "1.3.6.1.4.1.4128.2100.203";
 			};
 			soc_fw_config_hash: soc_fw_config_hash {
-				oid = SOC_FW_CONFIG_HASH_OID;
-			};
-			rmm_hash: rmm_hash {
-				oid = RMM_HASH_OID;
-			};
-		};
-
-		core_swd_key_cert: core_swd_key_cert {
-			root-certificate;
-			image-id = <CORE_SWD_KEY_CERT_ID>;
-			signing-key = <&swd_rot_pk>;
-			antirollback-counter = <&trusted_nv_ctr>;
-
-			core_swd_pk: core_swd_pk {
-				oid = CORE_SWD_PK_OID;
-			};
-		};
-
-		trusted_os_fw_content_cert: trusted_os_fw_content_cert {
-			image-id = <TRUSTED_OS_FW_CONTENT_CERT_ID>;
-			parent = <&core_swd_key_cert>;
-			signing-key = <&core_swd_pk>;
-			antirollback-counter = <&trusted_nv_ctr>;
-
-			tos_fw_hash: tos_fw_hash {
-				oid = TRUSTED_OS_FW_HASH_OID;
-			};
-			tos_fw_config_hash: tos_fw_config_hash {
-				oid = TRUSTED_OS_FW_CONFIG_HASH_OID;
+				oid = "1.3.6.1.4.1.4128.2100.604";
 			};
 		};
 
 		plat_key_cert: plat_key_cert {
 			root-certificate;
-			image-id = <PLAT_KEY_CERT_ID>;
+			image-id = <38>;
 			signing-key = <&prot_pk>;
 			antirollback-counter = <&non_trusted_nv_ctr>;
 
 			plat_pk: plat_pk {
-				oid = PLAT_PK_OID;
+				oid =  "1.3.6.1.4.1.4128.2100.1105";
 			};
 		};
 
@@ -87,153 +43,40 @@
 			antirollback-counter = <&non_trusted_nv_ctr>;
 
 			nt_world_bl_hash: nt_world_bl_hash {
-				oid = NON_TRUSTED_WORLD_BOOTLOADER_HASH_OID;
+				oid = "1.3.6.1.4.1.4128.2100.1201";
 			};
 			nt_fw_config_hash: nt_fw_config_hash {
-				oid = NON_TRUSTED_FW_CONFIG_HASH_OID;
+				oid = "1.3.6.1.4.1.4128.2100.1202";
 			};
 		};
 
-#if defined(SPD_spmd)
-		sip_sp_content_cert: sip_sp_content_cert {
-			image-id = <SIP_SP_CONTENT_CERT_ID>;
-			parent = <&wrong_parent>;
-			signing-key = <&core_swd_pk>;
-			antirollback-counter = <&trusted_nv_ctr>;
-
-			sp_pkg1_hash: sp_pkg1_hash {
-				oid = SP_PKG1_HASH_OID;
-			};
-			sp_pkg2_hash: sp_pkg2_hash {
-				oid = SP_PKG2_HASH_OID;
-			};
-			sp_pkg3_hash: sp_pkg3_hash {
-				oid = SP_PKG3_HASH_OID;
-			};
-			sp_pkg4_hash: sp_pkg4_hash {
-				oid = SP_PKG4_HASH_OID;
-			};
-		};
-
-		plat_sp_content_cert: plat_sp_content_cert {
-			image-id = <PLAT_SP_CONTENT_CERT_ID>;
-			signing-key = <&plat_pk>;
-			antirollback-counter = <&non_trusted_nv_ctr>;
-
-			sp_pkg5_hash: sp_pkg5_hash {
-				oid = SP_PKG5_HASH_OID;
-			};
-			sp_pkg6_hash: sp_pkg6_hash {
-				oid = SP_PKG6_HASH_OID;
-			};
-			sp_pkg7_hash: sp_pkg7_hash {
-				oid = SP_PKG7_HASH_OID;
-			};
-			sp_pkg8_hash: sp_pkg8_hash {
-				oid = SP_PKG8_HASH_OID;
-			};
-		};
-#endif
 	};
 
 	images {
 		compatible = "arm, img-descs";
 
 		hw_config {
-			image-id = <HW_CONFIG_ID>;
+			image-id = <23>;
 			parent = <&cca_content_cert>;
 			hash = <&hw_config_hash>;
 		};
 
-		bl31_image {
-			image-id = <BL31_IMAGE_ID>;
-			parent = <&cca_content_cert>;
-			hash = <&soc_fw_hash>;
-		};
-
 		soc_fw_config {
-			image-id = <SOC_FW_CONFIG_ID>;
+			image-id = <25>;
 			parent = <&cca_content_cert>;
 			hash = <&soc_fw_config_hash>;
 		};
 
-		rmm_image {
-			image-id = <RMM_IMAGE_ID>;
-			parent = <&cca_content_cert>;
-			hash = <&rmm_hash>;
-		};
-
-		bl32_image {
-			image-id = <BL32_IMAGE_ID>;
-			parent = <&trusted_os_fw_content_cert>;
-			hash = <&tos_fw_hash>;
-		};
-
-		tos_fw_config {
-			image-id = <TOS_FW_CONFIG_ID>;
-			parent = <&trusted_os_fw_content_cert>;
-			hash = <&tos_fw_config_hash>;
-		};
-
 		bl33_image {
-			image-id = <BL33_IMAGE_ID>;
+			image-id = <5>;
 			parent = <&non_trusted_fw_content_cert>;
 			hash = <&nt_world_bl_hash>;
 		};
 
 		nt_fw_config {
-			image-id = <NT_FW_CONFIG_ID>;
+			image-id = <27>;
 			hash = <&nt_fw_config_hash>;
 		};
-
-#if defined(SPD_spmd)
-		sp_pkg1 {
-			image-id = <SP_PKG1_ID>;
-			hash = <&sp_pkg1_hash>;
-		};
-
-		sp_pkg2 {
-			image-id = <SP_PKG2_ID>;
-			parent = <&sip_sp_content_cert>;
-			hash = <&sp_pkg2_hash>;
-		};
-
-		sp_pkg3 {
-			image-id = <SP_PKG3_ID>;
-			parent = <&sip_sp_content_cert>;
-			hash = <&sp_pkg3_hash>;
-		};
-
-		sp_pkg4 {
-			image-id = <SP_PKG4_ID>;
-			parent = <&sip_sp_content_cert>;
-			hash = <&sp_pkg4_hash>;
-		};
-
-		sp_pkg5 {
-			image-id = <SP_PKG5_ID>;
-			parent = <&plat_sp_content_cert>;
-			hash = <&sp_pkg5_hash>;
-		};
-
-		sp_pkg6 {
-			image-id = <SP_PKG6_ID>;
-			parent = <&wrong_parent>;
-			hash = <&sp_pkg6_hash>;
-		};
-
-		sp_pkg7 {
-			image-id = <SP_PKG7_ID>;
-			parent = <&plat_sp_content_cert>;
-			hash = <&sp_pkg7_hash>;
-		};
-
-		sp_pkg8 {
-			image-id = <SP_PKG8_ID>;
-			parent = <&plat_sp_content_cert>;
-			hash = <&sp_pkg8_hash>;
-		};
-#endif
 	};
 };
 
@@ -244,26 +87,27 @@
 	#size-cells = <0>;
 
 	cca_nv_ctr: cca_nv_ctr {
-		id  = <TRUSTED_NV_CTR_ID>;
-		oid = CCA_FW_NVCOUNTER_OID;
+		id  = <0>;
+		oid = "1.3.6.1.4.1.4128.2100.3";
 	};
 
 	trusted_nv_ctr: trusted_nv_ctr {
-		id  = <TRUSTED_NV_CTR_ID>;
-		oid = TRUSTED_FW_NVCOUNTER_OID;
+		id  = <0>;
+		oid = "1.3.6.1.4.1.4128.2100.1";
 	};
 
 	non_trusted_nv_ctr: non_trusted_nv_ctr {
-		id  = <NON_TRUSTED_NV_CTR_ID>;
-		oid = NON_TRUSTED_FW_NVCOUNTER_OID;
+		id  = <1>;
+		oid = "1.3.6.1.4.1.4128.2100.2";
 	};
 };
 
 rot_keys {
 	swd_rot_pk: swd_rot_pk {
-		oid = SWD_ROT_PK_OID;
+		oid = "1.3.6.1.4.1.4128.2100.1103";
 	};
+
 	prot_pk: prot_pk {
-		oid = PROT_PK_OID;
+		oid = "1.3.6.1.4.1.4128.2100.1102";
 	};
 };