Added tests for IPMI payload commands

Signed-off-by: Tony Lee <tony.lee@quantatw.com>
Change-Id: I1396ea72feed442882685fb3d3c45eab8156efc0
diff --git a/data/ipmi_raw_cmd_table.py b/data/ipmi_raw_cmd_table.py
index f68f5ac..9dbd8cc 100644
--- a/data/ipmi_raw_cmd_table.py
+++ b/data/ipmi_raw_cmd_table.py
@@ -119,5 +119,37 @@
             "11 02",
             "11 is Parameter revision, 02 is Configuration parameter data e.g. Cipher Suite Entry count",
         ]
+    },
+    'Payload':
+    {
+        'Get_Payload_Activation_Status':
+        [
+            # raw command, expected output(s), comment
+            "0x06 0x4a 0x01",
+            "01 00 00",
+            "1st byte is instance capacity, last two bytes is activation status of instances",
+        ],
+        'Activate_Payload':
+        [
+            # raw command, expected output(s), comment
+            "0x06 0x48 0x01 0x01 0xc6 0x00 0x00 0x00",
+            "00 00 00 00 ff 00 ff 00 6f 02 ff ff",
+            "Last two bits are payload vlan number, - FFFFh if VLAN addressing is not used",
+        ],
+        'Deactivate_Payload':
+        [
+            # raw command, expected output(s), comment
+            "0x06 0x49 0x01 0x01 0x00 0x00 0x00 0x00",
+            "",
+            "Line feed only",
+        ],
+        'Get_Payload_Instance_Info':
+        [
+            # raw command, expected output(s), comment
+            "0x06 0x4b 0x01 0x01",
+            "00 00 00 00 00 00 00 00 00 00 00 00",
+            "When the payload is activated, the first four bytes are the session ID,"
+            "otherwise it should be 00."
+        ]
     }
 }