

malserver
----------------

malserver was built to be useful for testing the MAL protocol stack. 
It will listen for TCP/IP connections on a port, print information 
on the MAL commands sent upstream to the console, and send some MAL 
commands downstream as a response.  malserver is not intended to be 
representative of a feature complete MAL branded server, but rather, 
can be used as a testbed for MAL clients.


Notes
-----
A good starting point is getting malserver and malclient running 
against one another.  Once both malserver and malclient are 
compiled, start malserver then when it indicates it is accepting
connections, try running malclient.  Both console windows should
have information about the commands that were sent by the opposite
end.  (By default, malclient will try to connect to port 8091
on the local machine, "localhost".)

Both malserver and malclient can load information from XML files, 
but in the case that the XML file cannot be found, both will run 
with some default values.  (Example XML files are included.)


To Do
-----
- malserver will be updated whenever the protocol specification 
   is updated so that it is always testing as much of the spec as 
   possible
- Make sure it works on all of the advertised platforms (win32, *nix)


Tools
-----
The malserver.dsp and malserver.mak were generated by Microsoft's 
Visual C++ 6.0 development environment.
The Makefile defaults to using gcc.

Last Updated: January 13, 1999
Owner: Mike Gray (mikeg@avantgo.com)