/*
Copyright (c) 2010, ProjectHax
All rights reserved.

Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright
   notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
   notice, this list of conditions and the following disclaimer in the
   documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software
   must display the following acknowledgement:
   This product includes software developed by the ProjectHax.
4. Neither the name of the ProjectHax nor the
   names of its contributors may be used to endorse or promote products
   derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY ProjectHax ''AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL ProjectHax BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/

#ifndef _INC_STDIO
        #include "stdio.h"
#endif

#include "Packet.h"

#ifndef _HANDSHAKE_
#define _HANDSHAKE_

#pragma pack(push, 1)
        struct tPacket_5000
        {
                WORD size;
                WORD opcode;
                BYTE securityCount;
                BYTE securityCRC;
                BYTE flag;
        };

        struct tPacket_5000_E
        {
                WORD size;
                WORD opcode;
                BYTE securityCount;
                BYTE securityCRC;
                BYTE flag;
                BYTE blowfish[8];
                DWORD seedCount;
                DWORD seedCRC;
                DWORD seedSecurity[5];
        };

        struct tPacket_5000_10
        {
                WORD size;
                WORD opcode;
                BYTE securityCount;
                BYTE securityCRC;
                BYTE flag;
                DWORD challenge[2];
        };
#pragma pack(pop)

class cBlowFish
{
private:
        DWORD* PArray;
        DWORD (*SBoxes)[256];
        void Blowfish_encipher(DWORD *xl, DWORD *xr);
        void Blowfish_decipher(DWORD *xl, DWORD *xr);
public:
        cBlowFish();
        ~cBlowFish();
        void Initialize(BYTE key[], int keybytes);
        DWORD GetOutputLength(DWORD lInputLong);
        DWORD Encode(BYTE * pInput, BYTE * pOutput, DWORD lSize);
        void Decode(BYTE * pInput, BYTE * pOutput, DWORD lSize);
};

class phHandShake
{
private:

        //Random number
        DWORD random;

        //HandShake seeds
        unsigned char byte1seeds[3];

        unsigned long GenerateValue(unsigned long* Ptr);
        void SetupCountByte(unsigned long seed);

        DWORD dwArgs5;
        DWORD dwArgs6;

public:

        //Constructor
        phHandShake();

        //Destructor
        ~phHandShake();

        //Blowfish class
        cBlowFish blowfish;

        //HandShake packets
        int PacketReceive(void* data);
        int PacketReceive(void* data, LPBYTE outdata, DWORD* outDataSize);

        unsigned char GenerateCheckByte(char* packet, int length, unsigned long seed);

        unsigned char GenerateCountByte(void);

        //Returns the random value
        DWORD GetRandomNumber() { return random; };

        //Sets the random value
        void SetRandomNumber(DWORD value);

        DWORD GetCRCSeed() { return firstPacket.seedCRC; };

        //First HandShake packet
        tPacket_5000_E firstPacket;

        //Second HandShake packet
        tPacket_5000_10 secondPacket;
};

#endif
