openipmicmd --version (return code: 0)
ipmicmd
This little utility is an ipmi command tool ;-)
It can be used to send commands to an IPMI interface
type -? for usage info.
Enjoy!
openipmicmd -HELP (return code: 1)
openipmicmd [-k <command>] [-v] <con_parms>
Where <con_parms> is one of:
smi
smi <num>
where the <num> is the IPMI device number to connect to.
lan
lan [-U <username>] [-P <password>] [-p[2] port] [-A <authtype>]
[-L <privilege>] [-s] [-Ra <auth alg>] [-Ri <integ alg>]
[-Rc <conf algo>] [-Rl] [-Rk <bmc key>] [-H <hackname>]
[-M <max outstanding msgs>] <host1> [<host2>]
If -s is supplied, then two host names are taken (the second port
may be specified with -p2). Otherwise, only one hostname is
taken. The defaults are an empty username and password (anonymous),
port 623, admin privilege, and authtype defaulting to the most
secure one available.
privilege is one of: callback, user, operator, admin, or oem. These
select the specific commands that are available to the connection.
Higher privileges (ones further to the right in the above list) have
more commands available to them.
authtype is one of the following: rmcp+, md5, md2, straight, or none.
Setting this to anything but rmcp+ forces normal rmcp
authentication. By default the most secure method available is
chosen, in the order given above.
For RMCP+ connections, the authentication algorithms supported (-Ra)
are: bmcpick, rakp_none, rakp_hmac_sha1, and rakp_hmac_md5. The
integrity algorithms (-Ri) supported are: bmcpick, none, hmac_sha1,
hmac_md5, and md5. The confidentiality algorithms (-Rc) are: bmcpick,
aes_cbc_128, xrc4_128, and xrc_40. The defaults are
rackp_hmac_sha1, hmac_sha1, and aes_cb_128. -Rl turns on lookup up
names by the name and the privilege level (allowing the same name with
different privileges and different passwords), the default is straight
name lookup. -Rk sets the BMC key, needed if the system does two-key
lookups. The -M option sets the maximum outstanding messages.
The default is 2, ranges 1-63.
The -H option enables certain hacks for broken platforms. This may
be listed multiple times to enable multiple hacks. The currently
available hacks are:
intelplus - For Intel platforms that have broken RMCP+.
rakp3_wrong_rolem - For systems that truncate role(m) in the RAKP3 msg.
rmcpp_integ_sik - For systems that use SIK instead of K(1) for integrity.