

malclient
----------------

malclient was built to be useful for testing the MAL protocol stack.
It will open a TCP/IP socket on a port, send a few MAL commands to 
the server, then print information on the MAL commands coming from 
the server to the console.

Notes
-----
A good starting point is getting malserver and malclient running 
against one another.  Once both malserver and malclient are 
compiled, start malserver then when it indicates it is accepting
connections, try running malclient.  Both console windows should
have information about the commands that were sent by the opposite
end. (By default, malclient will try to connect to port 8091
on the local machine, "localhost".)

Both malserver and malclient can load information from XML files, 
but in the case that the XML file cannot be found, both will run 
with some default values.  (Example XML files are included.)


To Do
-----
- malclient will be updated whenever the protocol specification 
   is updated so that it is always testing as much of the spec as 
   possible
- Make sure it works on all of the advertised platforms (win32, *nix)


Tools
-----
The malclient.dsp and malclient.mak were generated by Microsoft's 
Visual C++ 6.0 development environment.
The Makefile defaults to using gcc.

Last Updated: January 13, 1999
Owner: Mike Gray (mikeg@avantgo.com)