Added new cases for IPMI Set User access payload.

Testcases Added:

1) Verify Set User Access Payload For Standard Payload SOL
       Disable standard payload 1(SOL) using set user access payload command
   and verify it in get user access payload command and also check
   sol activate is not working.

2) Verify Set User Access Payload For Operator Privileged User
       Verify set user access payload command is not accessbile for Operator
   privileged User.

Moved below keywords from ipmi/test_ipmi_user.robot to lib/ipmi_client.robot
for reuse purpose.
   Enable IPMI User And Verify
   Create Random IPMI User
   Delete Created User

Added IPMI raw cmd for Set user access payload.

Tested: Run robot ipmi/test_ipmi_paylaod.robot.

Signed-off-by: Nagarjun B  <nagarjunb@ami.com>
Change-Id: I8c7f3b0e46895fad0f6483043f76b714152a85be
diff --git a/data/ipmi_raw_cmd_table.py b/data/ipmi_raw_cmd_table.py
index 7a5cbea..bc8c69c 100644
--- a/data/ipmi_raw_cmd_table.py
+++ b/data/ipmi_raw_cmd_table.py
@@ -193,7 +193,17 @@
             "00 00 00 00 00 00 00 00 00 00 00 00",
             "When the payload is activated, the first four bytes are the session ID,"
             "otherwise it should be 00."
-        ]
+        ],
+        'Get_User_Access_Payload':
+        [
+            # raw command,
+            "0x06 0x4d"
+        ],
+        'Set_User_Access_Payload':
+        [
+            # raw command,
+            "0x06 0x4c"
+        ],
     },
     'BIOS_POST_Code':
     {