Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

extra 0x00 prefix in raw data return? #5

Open
zenfish opened this issue Dec 23, 2022 · 0 comments
Open

extra 0x00 prefix in raw data return? #5

zenfish opened this issue Dec 23, 2022 · 0 comments

Comments

@zenfish
Copy link

zenfish commented Dec 23, 2022

I did a quick copy of your Sample1 script to get the user name for user 2 -

(important bits, all the rest pretty much identical)

        print('\nGet User Name 2:')
        rsp = self.intf.issue_raw_cmd([6, 0x46, 2])
        self.print_rsp(rsp)

It returned -

00 41 44 4d 49 4e 00 00 00 00 00 00 00 00 00 00 00

Looking at tcpdump and using ipmitool to check the output -

ipmitool -H 192.168.0.24 -I lan -U ADMIN -P ADMIN raw 0x06 0x46 0x02

I'd expect the output to be only the data part of the response packet, which starts at 41... am I missing something (or wrong, or overly tired, or......)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant