public override bool Read(IClient client, IncomingAuthenticationPacket packet)
        {
            packet.ReadInt32Field("Survey Id");
            packet.ReadBooleanField("Success");
            var dataSize = packet.ReadInt16Field("Data Size");
            packet.ReadBytesField("Survey Data", dataSize.Value);

            return true;
        }
        public override bool Read(IClient client, IncomingAuthenticationPacket packet)
        {
            packet.ReadBigIntegerField("Reconnect Proof R1", 16); // MD5(AccountName, byte[16] random)
            packet.ReadBigIntegerField("Reconnect Proof R2", 20); // SHA-1(AccountName, R1, ReconnectProof, SessionKey)
            packet.ReadBigIntegerField("Reconnect Proof R3", 20); // SHA-1(R1, byte[16] zeros)

            var keyCount = packet.ReadByteField("Key Count");
            if (keyCount > 0)
            {
                for (var i = 0; i < keyCount; i++)
                {
                    packet.ReadInt16Field("Key - Unknown 1");
                    packet.ReadInt32Field("Key - Unknown 2");
                    packet.ReadBytesField("Key - Unknown 3", 4);
                    packet.ReadBytesField("Key - SHA-1 Hash", 20); // SHA(PublicA, PublicB, byte[20] unknown)
                }
            }

            return true;
        }
        public override bool Read(IClient client, IncomingAuthenticationPacket packet)
        {
            packet.ReadBigIntegerField("SRP A", WowAuthenticationParameters.KeySize);
            packet.ReadBigIntegerField("SRP Proof", 20);

            // SHA-1 hash of the PublicA and HMAC SHA-1 of the contents of WoW.exe and unicows.dll. HMAC seed is
            // the 16 bytes at the end of the challenge sent by the server. Currently fairly useless for us.
            packet.ReadBytesField("Client File SHA-1 Hash", 20);

            var keyCount = packet.ReadByteField("Key Count");
            if (keyCount > 0)
            {
                for (var i = 0; i < keyCount; i++)
                {
                    packet.ReadInt16Field("Key - Unknown 1");
                    packet.ReadInt32Field("Key - Unknown 2");
                    packet.ReadBytesField("Key - Unknown 3", 4);
                    packet.ReadBytesField("Key - SHA-1 Hash", 20); // SHA-1(PublicA, PublicB, byte[20] unknown)
                }
            }

            var securityFlags = (ExtraSecurityFlags)packet.ReadByteField("Extra Security Flags").Value;

            if (securityFlags.HasFlag(ExtraSecurityFlags.Pin))
            {
                packet.ReadBytesField("PIN Random", 16);
                packet.ReadBytesField("PIN SHA-1 Hash", 20);
            }

            if (securityFlags.HasFlag(ExtraSecurityFlags.Matrix))
            {
                packet.ReadBytesField("Matrix HMAC SHA-1 Hash", 20);
            }

            if (securityFlags.HasFlag(ExtraSecurityFlags.Token))
            {
                var tokenLength = packet.ReadByteField("Security Token Length");
                packet.ReadBytesField("Security Token", tokenLength);
            }

            return true;
        }