IPMI/DCMI: Modified script based on user input

Changes:
    - Modified script based on user input
Tested:
    - Ran ipmi/ and ipmi/dcmi

Change-Id: Ic9d6e29ae199cffb6009e6718ae499293c319c96
Signed-off-by: Ishwarya Mathi M <ishwaryamm@ami.com>
diff --git a/ipmi/test_ipmi_payload.robot b/ipmi/test_ipmi_payload.robot
index 31db911..9d9ec82 100644
--- a/ipmi/test_ipmi_payload.robot
+++ b/ipmi/test_ipmi_payload.robot
@@ -285,7 +285,7 @@
 
     ${raw_command}=  Catenate  ${IPMI_RAW_CMD['Payload']['Get_User_Access_Payload'][0]}
     ...  ${channel_number} ${user_id}
-    ${resp}=  Run External IPMI Raw Command  ${raw_command}
+    ${resp}=  Run IPMI Command  ${raw_command}
     [Return]  ${resp}
 
 
@@ -345,7 +345,7 @@
     # password    The user password (e.g. "0penBmc", "0penBmc1", etc.).
     # options     Additional ipmitool command options  (e.g "-L=Operator","-C=3").
 
-    Wait Until Keyword Succeeds  15 sec  5 sec  Run External IPMI Raw Command
+    Wait Until Keyword Succeeds  15 sec  5 sec  Run IPMI Command
     ...  ${IPMI_RAW_CMD['Device GUID']['Get'][0]}  U=${username}  P=${password}  &{options}
 
 
@@ -476,7 +476,7 @@
         ${get_cmd}=  Catenate  ${IPMI_RAW_CMD['Payload']['Get_Channel_Payload_Version'][0]}
         ...  ${channel_number} ${payload_type_number}
 
-        ${resp}=  Run External IPMI Raw Command  ${get_cmd}
+        ${resp}=  Run IPMI Command  ${get_cmd}
         ${resp}=  Strip String  ${resp}
         Should Be Equal  ${resp}  10
     END
@@ -529,7 +529,7 @@
     ...  Verify Invalid IPMI Command  ${raw_cmd}  0xcc
 
     # will be executed only if invalid_channel == 0.
-    ${resp}=  Run External IPMI Raw Command  ${raw_cmd}
+    ${resp}=  Run IPMI Command  ${raw_cmd}
 
     ${resp}=  Strip String  ${resp}
     ${expected_resp}=  Catenate  ${standard_payload_type_resp}  ${session_setup_payload_resp} 00 00 00 00