亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? lcp.c

?? ppp協議的lwip源代碼
?? C
?? 第 1 頁 / 共 4 頁
字號:
	/* If there is still anything left, this packet is bad. */
	if (len != 0)
		goto bad;
	
	/*
	* OK, the Nak is good.  Now we can update state.
	*/
	if (f->state != OPENED) {
		if (looped_back) {
			if (++try.numloops >= lcp_loopbackfail) {
				LCPDEBUG((LOG_NOTICE, "Serial line is looped back.\n"));
				lcp_close(f->unit, "Loopback detected");
			}
		} 
		else
			try.numloops = 0;
		*go = try;
	}
	
	return 1;
	
bad:
	LCPDEBUG((LOG_WARNING, "lcp_nakci: received bad Nak!\n"));
	return 0;
}


/*
 * lcp_rejci - Peer has Rejected some of our CIs.
 * This should not modify any state if the Reject is bad
 * or if LCP is in the OPENED state.
 *
 * Returns:
 *	0 - Reject was bad.
 *	1 - Reject was good.
 */
static int lcp_rejci(fsm *f, u_char *p, int len)
{
	lcp_options *go = &lcp_gotoptions[f->unit];
	u_char cichar;
	u_short cishort;
	u32_t cilong;
	lcp_options try;		/* options to request next time */
	
	try = *go;
	
	/*
	* Any Rejected CIs must be in exactly the same order that we sent.
	* Check packet length and CI length at each step.
	* If we find any deviations, then this packet is bad.
	*/
#define REJCIVOID(opt, neg) \
	if (go->neg && \
			len >= CILEN_VOID && \
			p[1] == CILEN_VOID && \
			p[0] == opt) { \
		len -= CILEN_VOID; \
		INCPTR(CILEN_VOID, p); \
		try.neg = 0; \
		LCPDEBUG((LOG_INFO, "lcp_rejci: void opt %d rejected\n", opt)); \
	}
#define REJCISHORT(opt, neg, val) \
	if (go->neg && \
			len >= CILEN_SHORT && \
			p[1] == CILEN_SHORT && \
			p[0] == opt) { \
		len -= CILEN_SHORT; \
		INCPTR(2, p); \
		GETSHORT(cishort, p); \
		/* Check rejected value. */ \
		if (cishort != val) \
			goto bad; \
		try.neg = 0; \
		LCPDEBUG((LOG_INFO,"lcp_rejci: short opt %d rejected\n", opt)); \
	}
#define REJCICHAP(opt, neg, val, digest) \
	if (go->neg && \
			len >= CILEN_CHAP && \
			p[1] == CILEN_CHAP && \
			p[0] == opt) { \
		len -= CILEN_CHAP; \
		INCPTR(2, p); \
		GETSHORT(cishort, p); \
		GETCHAR(cichar, p); \
		/* Check rejected value. */ \
		if (cishort != val || cichar != digest) \
			goto bad; \
		try.neg = 0; \
		try.neg_upap = 0; \
		LCPDEBUG((LOG_INFO,"lcp_rejci: chap opt %d rejected\n", opt)); \
	}
#define REJCILONG(opt, neg, val) \
	if (go->neg && \
			len >= CILEN_LONG && \
			p[1] == CILEN_LONG && \
			p[0] == opt) { \
		len -= CILEN_LONG; \
		INCPTR(2, p); \
		GETLONG(cilong, p); \
		/* Check rejected value. */ \
		if (cilong != val) \
			goto bad; \
		try.neg = 0; \
		LCPDEBUG((LOG_INFO,"lcp_rejci: long opt %d rejected\n", opt)); \
	}
#define REJCILQR(opt, neg, val) \
	if (go->neg && \
			len >= CILEN_LQR && \
			p[1] == CILEN_LQR && \
			p[0] == opt) { \
		len -= CILEN_LQR; \
		INCPTR(2, p); \
		GETSHORT(cishort, p); \
		GETLONG(cilong, p); \
		/* Check rejected value. */ \
		if (cishort != PPP_LQR || cilong != val) \
			goto bad; \
		try.neg = 0; \
		LCPDEBUG((LOG_INFO,"lcp_rejci: LQR opt %d rejected\n", opt)); \
	}
#define REJCICBCP(opt, neg, val) \
	if (go->neg && \
			len >= CILEN_CBCP && \
			p[1] == CILEN_CBCP && \
			p[0] == opt) { \
		len -= CILEN_CBCP; \
		INCPTR(2, p); \
		GETCHAR(cichar, p); \
		/* Check rejected value. */ \
		if (cichar != val) \
			goto bad; \
		try.neg = 0; \
		LCPDEBUG((LOG_INFO,"lcp_rejci: Callback opt %d rejected\n", opt)); \
	}
	
	REJCISHORT(CI_MRU, neg_mru, go->mru);
	REJCILONG(CI_ASYNCMAP, neg_asyncmap, go->asyncmap);
	REJCICHAP(CI_AUTHTYPE, neg_chap, PPP_CHAP, go->chap_mdtype);
	if (!go->neg_chap) {
		REJCISHORT(CI_AUTHTYPE, neg_upap, PPP_PAP);
	}
	REJCILQR(CI_QUALITY, neg_lqr, go->lqr_period);
	REJCICBCP(CI_CALLBACK, neg_cbcp, CBCP_OPT);
	REJCILONG(CI_MAGICNUMBER, neg_magicnumber, go->magicnumber);
	REJCIVOID(CI_PCOMPRESSION, neg_pcompression);
	REJCIVOID(CI_ACCOMPRESSION, neg_accompression);
	
	/*
	* If there are any remaining CIs, then this packet is bad.
	*/
	if (len != 0)
		goto bad;
	/*
	* Now we can update state.
	*/
	if (f->state != OPENED)
		*go = try;
	return 1;
	
bad:
	LCPDEBUG((LOG_WARNING, "lcp_rejci: received bad Reject!\n"));
	return 0;
}


/*
 * lcp_reqci - Check the peer's requested CIs and send appropriate response.
 *
 * Returns: CONFACK, CONFNAK or CONFREJ and input packet modified
 * appropriately.  If reject_if_disagree is non-zero, doesn't return
 * CONFNAK; returns CONFREJ if it can't return CONFACK.
 */
static int lcp_reqci(fsm *f, 
						u_char *inp,		/* Requested CIs */
						int *lenp,			/* Length of requested CIs */
						int reject_if_disagree)
{
	lcp_options *go = &lcp_gotoptions[f->unit];
	lcp_options *ho = &lcp_hisoptions[f->unit];
	lcp_options *ao = &lcp_allowoptions[f->unit];
	u_char *cip, *next;			/* Pointer to current and next CIs */
	int cilen, citype, cichar;	/* Parsed len, type, char value */
	u_short cishort;			/* Parsed short value */
	u32_t cilong;			/* Parse long value */
	int rc = CONFACK;			/* Final packet return code */
	int orc;					/* Individual option return code */
	u_char *p;					/* Pointer to next char to parse */
	u_char *rejp;				/* Pointer to next char in reject frame */
	u_char *nakp;				/* Pointer to next char in Nak frame */
	int l = *lenp;				/* Length left */
#if TRACELCP > 0
	char traceBuf[80];
	int traceNdx = 0;
#endif
	
	/*
	 * Reset all his options.
	 */
	BZERO(ho, sizeof(*ho));
	
	/*
	 * Process all his options.
	 */
	next = inp;
	nakp = nak_buffer;
	rejp = inp;
	while (l) {
		orc = CONFACK;			/* Assume success */
		cip = p = next;			/* Remember begining of CI */
		if (l < 2 ||			/* Not enough data for CI header or */
				p[1] < 2 ||			/*  CI length too small or */
				p[1] > l) {			/*  CI length too big? */
			LCPDEBUG((LOG_WARNING, "lcp_reqci: bad CI length!\n"));
			orc = CONFREJ;		/* Reject bad CI */
			cilen = l;			/* Reject till end of packet */
			l = 0;			/* Don't loop again */
			citype = 0;
			goto endswitch;
		}
		GETCHAR(citype, p);		/* Parse CI type */
		GETCHAR(cilen, p);		/* Parse CI length */
		l -= cilen;			/* Adjust remaining length */
		next += cilen;			/* Step to next CI */
		
		switch (citype) {		/* Check CI type */
		case CI_MRU:
			if (!ao->neg_mru) {		/* Allow option? */
				LCPDEBUG((LOG_INFO, "lcp_reqci: Reject MRU - not allowed\n"));
				orc = CONFREJ;		/* Reject CI */
				break;
			} else if (cilen != CILEN_SHORT) {	/* Check CI length */
				LCPDEBUG((LOG_INFO, "lcp_reqci: Reject MRU - bad length\n"));
				orc = CONFREJ;		/* Reject CI */
				break;
			}
			GETSHORT(cishort, p);	/* Parse MRU */
			
			/*
			 * He must be able to receive at least our minimum.
			 * No need to check a maximum.  If he sends a large number,
			 * we'll just ignore it.
			 */
			if (cishort < PPP_MINMRU) {
				LCPDEBUG((LOG_INFO, "lcp_reqci: Nak - MRU too small\n"));
				orc = CONFNAK;		/* Nak CI */
				PUTCHAR(CI_MRU, nakp);
				PUTCHAR(CILEN_SHORT, nakp);
				PUTSHORT(PPP_MINMRU, nakp);	/* Give him a hint */
				break;
			}
			ho->neg_mru = 1;		/* Remember he sent MRU */
			ho->mru = cishort;		/* And remember value */
#if TRACELCP > 0
			sprintf(&traceBuf[traceNdx], " MRU %d", cishort);
			traceNdx = strlen(traceBuf);
#endif
			break;
		
		case CI_ASYNCMAP:
			if (!ao->neg_asyncmap) {
				LCPDEBUG((LOG_INFO, "lcp_reqci: Reject ASYNCMAP not allowed\n"));
				orc = CONFREJ;
				break;
			} else if (cilen != CILEN_LONG) {
				LCPDEBUG((LOG_INFO, "lcp_reqci: Reject ASYNCMAP bad length\n"));
				orc = CONFREJ;
				break;
			}
			GETLONG(cilong, p);
			
			/*
			 * Asyncmap must have set at least the bits
			 * which are set in lcp_allowoptions[unit].asyncmap.
			 */
			if ((ao->asyncmap & ~cilong) != 0) {
				LCPDEBUG((LOG_INFO, "lcp_reqci: Nak ASYNCMAP %lX missing %lX\n", 
							cilong, ao->asyncmap));
				orc = CONFNAK;
				PUTCHAR(CI_ASYNCMAP, nakp);
				PUTCHAR(CILEN_LONG, nakp);
				PUTLONG(ao->asyncmap | cilong, nakp);
				break;
			}
			ho->neg_asyncmap = 1;
			ho->asyncmap = cilong;
#if TRACELCP > 0
			sprintf(&traceBuf[traceNdx], " ASYNCMAP=%lX", cilong);
			traceNdx = strlen(traceBuf);
#endif
			break;
		
		case CI_AUTHTYPE:
			if (cilen < CILEN_SHORT) {
				LCPDEBUG((LOG_INFO, "lcp_reqci: Reject AUTHTYPE missing arg\n"));
				orc = CONFREJ;
				break;
			} else if (!(ao->neg_upap || ao->neg_chap)) {
				/*
				 * Reject the option if we're not willing to authenticate.
				 */
				LCPDEBUG((LOG_INFO, "lcp_reqci: Reject AUTHTYPE not allowed\n"));
				orc = CONFREJ;
				break;
			}
			GETSHORT(cishort, p);
			
			/*
			 * Authtype must be UPAP or CHAP.
			 *
			 * Note: if both ao->neg_upap and ao->neg_chap are set,
			 * and the peer sends a Configure-Request with two
			 * authenticate-protocol requests, one for CHAP and one
			 * for UPAP, then we will reject the second request.
			 * Whether we end up doing CHAP or UPAP depends then on
			 * the ordering of the CIs in the peer's Configure-Request.
			 */
			
			if (cishort == PPP_PAP) {
				if (ho->neg_chap) {	/* we've already accepted CHAP */
					LCPDEBUG((LOG_WARNING, "lcp_reqci: Reject AUTHTYPE PAP already accepted\n"));
					orc = CONFREJ;
					break;
				} else if (cilen != CILEN_SHORT) {
					LCPDEBUG((LOG_WARNING, "lcp_reqci: Reject AUTHTYPE PAP bad len\n"));
					orc = CONFREJ;
					break;
				}
				if (!ao->neg_upap) {	/* we don't want to do PAP */
					LCPDEBUG((LOG_WARNING, "lcp_reqci: Nak AUTHTYPE PAP not allowed\n"));
					orc = CONFNAK;	/* NAK it and suggest CHAP */
					PUTCHAR(CI_AUTHTYPE, nakp);
					PUTCHAR(CILEN_CHAP, nakp);
					PUTSHORT(PPP_CHAP, nakp);
					PUTCHAR(ao->chap_mdtype, nakp);
					break;
				}
				ho->neg_upap = 1;
#if TRACELCP > 0
				sprintf(&traceBuf[traceNdx], " PAP (%X)", cishort);
				traceNdx = strlen(traceBuf);
#endif
				break;
			}
			if (cishort == PPP_CHAP) {
				if (ho->neg_upap) {	/* we've already accepted PAP */
					LCPDEBUG((LOG_WARNING, "lcp_reqci: Reject AUTHTYPE CHAP accepted PAP\n"));
					orc = CONFREJ;
					break;
				} else if (cilen != CILEN_CHAP) {
					LCPDEBUG((LOG_WARNING, "lcp_reqci: Reject AUTHTYPE CHAP bad len\n"));
					orc = CONFREJ;
					break;
				}
				if (!ao->neg_chap) {	/* we don't want to do CHAP */
					LCPDEBUG((LOG_WARNING, "lcp_reqci: Nak AUTHTYPE CHAP not allowed\n"));
					orc = CONFNAK;	/* NAK it and suggest PAP */
					PUTCHAR(CI_AUTHTYPE, nakp);
					PUTCHAR(CILEN_SHORT, nakp);
					PUTSHORT(PPP_PAP, nakp);
					break;
				}
				GETCHAR(cichar, p);	/* get digest type*/
				if (cichar != CHAP_DIGEST_MD5
#ifdef CHAPMS
						&& cichar != CHAP_MICROSOFT
#endif
				) {
					LCPDEBUG((LOG_WARNING, "lcp_reqci: Nak AUTHTYPE CHAP digest=%d\n", cichar));
					orc = CONFNAK;
					PUTCHAR(CI_AUTHTYPE, nakp);
					PUTCHAR(CILEN_CHAP, nakp);
					PUTSHORT(PPP_CHAP, nakp);
					PUTCHAR(ao->chap_mdtype, nakp);
					break;
				}
#if TRACELCP > 0
				sprintf(&traceBuf[traceNdx], " CHAP %X,%d", cishort, cichar);
				traceNdx = strlen(traceBuf);
#endif
				ho->chap_mdtype = cichar; /* save md type */
				ho->neg_chap = 1;
				break;
			}
			
			/*
			 * We don't recognize the protocol they're asking for.
			 * Nak it with something we're willing to do.
			 * (At this point we know ao->neg_upap || ao->neg_chap.)
			 */
			orc = CONFNAK;
			PUTCHAR(CI_AUTHTYPE, nakp);
			if (ao->neg_chap) {
				LCPDEBUG((LOG_WARNING, "lcp_reqci: Nak AUTHTYPE %d req CHAP\n", cishort));
				PUTCHAR(CILEN_CHAP, nakp);
				PUTSHORT(PPP_CHAP, nakp);
				PUTCHAR(ao->chap_mdtype, nakp);
			} 
			else {
				LCPDEBUG((LOG_WARNING, "lcp_reqci: Nak AUTHTYPE %d req PAP\n", cishort));
				PUTCHAR(CILEN_SHORT, nakp);
				PUTSHORT(PPP_PAP, nakp);
			}
			break;
		
		case CI_QUALITY:
			GETSHORT(cishort, p);
			GETLONG(cilong, p);
#if TRACELCP > 0
			sprintf(&traceBuf[traceNdx], " QUALITY (%x %x)", cishort, (unsigned int) cilong);
			traceNdx = strlen(traceBuf);
#endif

			if (!ao->neg_lqr ||
					cilen != CILEN_LQR) {
				orc = CONFREJ;
				break;
			}
			
			/*
			 * Check the protocol and the reporting period.
			 * XXX When should we Nak this, and what with?
			 */
			if (cishort != PPP_LQR) {
				orc = CONFNAK;
				PUTCHAR(CI_QUALITY, nakp);
				PUTCHAR(CILEN_LQR, nakp);
				PUTSHORT(PPP_LQR, nakp);
				PUTLONG(ao->lqr_period, nakp);
				break;
			}
			break;
		
		case CI_MAGICNUMBER:
			if (!(ao->neg_magicnumber || go->neg_magicnumber) ||
					cilen != CILEN_LONG) {
				orc = CONFREJ;
				break;
			}
			GETLONG(cilong, p);
#if TRACELCP > 0
			sprintf(&traceBuf[traceNdx], " MAGICNUMBER (%lX)", cilong);
			traceNdx = strlen(traceBuf);
#endif

			/*
			 * He must have a different magic number.
			 */
			if (go->neg_magicnumber &&
					cilong == go->magicnumber) {
				cilong = magic();	/* Don't put magic() inside macro! */
				orc = CONFNAK;
				PUTCHAR(CI_MAGICNUMBER, nakp);
				PUTCHAR(CILEN_LONG, nakp);
				PUTLONG(cilong, nakp);
				break;
			}
			ho->neg_magicnumber = 1;
			ho->magicnumber = cilong;
			break;
		
		
		case CI_PCOMPRESSION:
#if TRACELCP > 0
			sprintf(&traceBuf[traceNdx], " PCOMPRESSION");
			traceNdx = strlen(traceBuf);
#endif
			if (!ao->neg_pcompression ||
					cilen != CILEN_VOID) {
				orc = CONFREJ;
				break;
			}
			ho->neg_pcompression = 1;
			break;
		
		case CI_ACCOMPRESSION:
#if TRACELCP > 0
			sprintf(&traceBuf[traceNdx], " ACCOMPRESSION");
			traceNdx = strlen(traceBuf);
#endif
			if (!ao->neg_accompression ||
					cilen != CILEN_VOID) {
				orc = CONFREJ;
				break;
			}
			ho->neg_accompression = 1;
			break;
		
		default:
#if TRACELCP
			sprintf(&traceBuf[traceNdx], " unknown %d", citype);
			traceNdx = strlen(traceBuf);
#endif

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
丝袜美腿亚洲一区二区图片| 欧美天堂一区二区三区| 久久综合一区二区| 国产一区在线视频| 国产精品久久久久影院亚瑟 | 国产午夜亚洲精品理论片色戒| 国产精品一区二区三区四区| 国产精品久久久久影视| av电影一区二区| 夜色激情一区二区| 欧美一级爆毛片| 国产一区二区日韩精品| 亚洲天堂网中文字| 欧美日韩精品欧美日韩精品一 | 亚洲综合网站在线观看| 欧美日韩成人一区二区| 狠狠色伊人亚洲综合成人| 亚洲人午夜精品天堂一二香蕉| 日本道色综合久久| 日韩电影在线观看网站| 国产午夜亚洲精品午夜鲁丝片| 一本久道中文字幕精品亚洲嫩 | 喷水一区二区三区| 中文欧美字幕免费| 欧美日韩视频在线观看一区二区三区 | 日韩视频永久免费| 成人福利视频在线| 日精品一区二区| 欧美极品aⅴ影院| 欧美日韩亚洲不卡| 成人高清在线视频| 久久精品av麻豆的观看方式| 亚洲人成小说网站色在线| 56国语精品自产拍在线观看| 懂色av中文一区二区三区| 日韩高清欧美激情| 亚洲男人天堂一区| 精品国产三级电影在线观看| 91久久香蕉国产日韩欧美9色| 激情五月播播久久久精品| 一区二区三区免费看视频| 26uuu国产一区二区三区| 欧美日韩你懂得| 97国产一区二区| 国产一区高清在线| 午夜成人在线视频| 一区二区三区国产精品| 欧美激情在线免费观看| 91精品国产高清一区二区三区蜜臀 | 免费观看成人鲁鲁鲁鲁鲁视频| 国产日产精品1区| 91麻豆精品国产91久久久资源速度| 国产麻豆视频精品| 成人av在线看| 日韩电影一区二区三区四区| 国产精品不卡视频| 欧美成人高清电影在线| 在线观看av一区二区| 久久99精品国产91久久来源| 日韩av电影免费观看高清完整版| 一区二区中文字幕在线| 精品国产一区二区三区av性色 | 一区二区欧美视频| 日本一区二区视频在线| 欧美xxxxxxxx| 欧美色综合网站| 色婷婷久久综合| 成人一道本在线| 精品在线视频一区| 日韩和的一区二区| 亚洲高清在线视频| 亚洲人成亚洲人成在线观看图片| 国产欧美日韩一区二区三区在线观看| 91精品国产免费| 精品视频一区三区九区| 91亚洲国产成人精品一区二三| 国产一区二区三区在线观看免费 | ...中文天堂在线一区| 亚洲精品在线一区二区| 91精品欧美久久久久久动漫| 欧美日韩和欧美的一区二区| 91麻豆国产自产在线观看| www.欧美日韩国产在线| 国产丶欧美丶日本不卡视频| 国内精品视频666| 三级久久三级久久| 韩国精品主播一区二区在线观看| 日日夜夜一区二区| 日韩精品免费专区| 日本女优在线视频一区二区| 欧美a级理论片| 捆绑变态av一区二区三区| 七七婷婷婷婷精品国产| 欧美aaaaa成人免费观看视频| av中文字幕一区| 国产白丝精品91爽爽久久| av电影天堂一区二区在线观看| 不卡视频在线看| 91原创在线视频| 白白色亚洲国产精品| 99久久综合国产精品| 色呦呦日韩精品| 91久久人澡人人添人人爽欧美| 884aa四虎影成人精品一区| 欧美一区二视频| 精品国产乱子伦一区| 久久久久久一二三区| 日本一区二区三级电影在线观看 | 亚洲美女淫视频| 亚洲一区二区精品视频| 日韩专区在线视频| 激情小说欧美图片| 懂色av一区二区三区免费观看| 91丨porny丨户外露出| 欧美体内she精高潮| 欧美日韩国产另类不卡| 精品99久久久久久| 中文在线一区二区| 亚洲综合免费观看高清完整版在线| 国产精品欧美一区二区三区| 欧美激情综合在线| 亚洲资源中文字幕| 麻豆国产精品官网| av中文字幕亚洲| 欧美日产在线观看| 国产午夜亚洲精品午夜鲁丝片 | 亚洲日本电影在线| 午夜一区二区三区视频| 久草热8精品视频在线观看| 成人av在线播放网址| 色天天综合色天天久久| 久久噜噜亚洲综合| 亚洲福利视频三区| 国产精品一区二区无线| 欧美在线观看禁18| 国产亚洲欧美中文| 亚洲aⅴ怡春院| 丰满亚洲少妇av| 欧美精品在线视频| 1024国产精品| 国产一区二区三区免费在线观看 | 91日韩一区二区三区| 日韩欧美中文一区二区| 综合欧美一区二区三区| 狠狠狠色丁香婷婷综合久久五月| 91免费观看在线| 精品国产第一区二区三区观看体验| 亚洲男同1069视频| 国产成人在线影院| 欧美精品1区2区| 亚洲欧美一区二区三区极速播放 | 欧美日韩国产小视频| 国产精品入口麻豆原神| 美女一区二区久久| 久久精品视频网| 日本成人中文字幕在线视频| 91丨九色丨蝌蚪富婆spa| 久久久91精品国产一区二区精品 | 日韩色视频在线观看| 在线视频综合导航| 日韩美女视频一区二区在线观看| 国产精品传媒视频| 国产精品一区专区| 这里是久久伊人| 亚洲电影视频在线| 99视频一区二区| 国产精品人妖ts系列视频| 久色婷婷小香蕉久久| 欧美视频一区二区三区| 中文字幕一区视频| 成人av在线电影| 中文字幕精品一区二区三区精品| 精品在线你懂的| 91精品福利在线一区二区三区| 亚洲麻豆国产自偷在线| av电影在线观看不卡| 国产精品网站在线观看| 精品午夜一区二区三区在线观看| 日韩视频免费观看高清在线视频| 亚洲成人一二三| 欧美在线|欧美| 亚洲国产精品久久人人爱| 91麻豆123| 一区二区三区在线观看国产| 91蜜桃在线免费视频| 亚洲欧美电影院| 欧美在线观看视频在线| 亚洲一区在线看| 91免费观看视频在线| 亚洲视频网在线直播| 欧美亚洲国产怡红院影院| 亚洲电影在线播放| 国产精品毛片大码女人| 国产成人自拍高清视频在线免费播放| 国产欧美精品一区二区色综合| 成人黄色大片在线观看| 亚洲在线视频一区| 欧美色图12p| 欧美aaa在线| 国产日韩欧美亚洲|