亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? connect.c

?? 經過修改的在uClinux2.6上正常運行的ralink rt2571芯片組的設備驅動程序.
?? C
?? 第 1 頁 / 共 4 頁
字號:
/*
 ***************************************************************************
 * Ralink Tech Inc.
 * 4F, No. 2 Technology 5th Rd.
 * Science-based Industrial Park
 * Hsin-chu, Taiwan, R.O.C.
 *
 * (c) Copyright 2002-2006, Ralink Technology, Inc.
 *
 * This program is free software; you can redistribute it and/or modify  * 
 * it under the terms of the GNU General Public License as published by  * 
 * the Free Software Foundation; either version 2 of the License, or     * 
 * (at your option) any later version.                                   * 
 *                                                                       * 
 * This program is distributed in the hope that it will be useful,       * 
 * but WITHOUT ANY WARRANTY; without even the implied warranty of        * 
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the         * 
 * GNU General Public License for more details.                          * 
 *                                                                       * 
 * You should have received a copy of the GNU General Public License     * 
 * along with this program; if not, write to the                         * 
 * Free Software Foundation, Inc.,                                       * 
 * 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.             * 
 *                                                                       * 
 ************************************************************************

	Module Name:
	connect.c

	Abstract:

	Revision History:
	Who			When			What
	--------	----------		----------------------------------------------
	John		2004-08-08		Major modification from RT2560
*/
#include "rt_config.h"


UCHAR	CipherSuiteWpaNoneTkip[] = {
		0x00, 0x50, 0xf2, 0x01,	// oui
		0x01, 0x00,				// Version
		0x00, 0x50, 0xf2, 0x02,	// Multicast
		0x01, 0x00,				// Number of unicast
		0x00, 0x50, 0xf2, 0x02,	// unicast
		0x01, 0x00,				// number of authentication method
		0x00, 0x50, 0xf2, 0x00	// authentication
		};
UCHAR	CipherSuiteWpaNoneTkipLen = (sizeof(CipherSuiteWpaNoneTkip) / sizeof(UCHAR));

UCHAR	CipherSuiteWpaNoneAes[] = {
		0x00, 0x50, 0xf2, 0x01,	// oui
		0x01, 0x00,				// Version
		0x00, 0x50, 0xf2, 0x04,	// Multicast
		0x01, 0x00,				// Number of unicast
		0x00, 0x50, 0xf2, 0x04,	// unicast
		0x01, 0x00,				// number of authentication method
		0x00, 0x50, 0xf2, 0x00	// authentication
		};
UCHAR	CipherSuiteWpaNoneAesLen = (sizeof(CipherSuiteWpaNoneAes) / sizeof(UCHAR));


// The following MACRO is called after 1. starting an new IBSS, 2. succesfully JOIN an IBSS,
// or 3. succesfully ASSOCIATE to a BSS, 4. successfully RE_ASSOCIATE to a BSS
// All settings successfuly negotiated furing MLME state machines become final settings
// and are copied to pAd->ActiveCfg
#define COPY_SETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(_pAd) 								\
{																						\
	_pAd->PortCfg.SsidLen = _pAd->MlmeAux.SsidLen;									  \
	NdisMoveMemory(_pAd->PortCfg.Ssid, _pAd->MlmeAux.Ssid, _pAd->MlmeAux.SsidLen);	  \
	COPY_MAC_ADDR(_pAd->PortCfg.Bssid, _pAd->MlmeAux.Bssid);						  \
	_pAd->PortCfg.Channel = _pAd->MlmeAux.Channel;									  \
	_pAd->ActiveCfg.Aid = _pAd->MlmeAux.Aid;											\
	_pAd->ActiveCfg.AtimWin = _pAd->MlmeAux.AtimWin;									\
	_pAd->ActiveCfg.CapabilityInfo = _pAd->MlmeAux.CapabilityInfo;						\
	_pAd->PortCfg.BeaconPeriod = _pAd->MlmeAux.BeaconPeriod;						  \
	_pAd->ActiveCfg.CfpMaxDuration = _pAd->MlmeAux.CfpMaxDuration;						\
	_pAd->ActiveCfg.CfpPeriod = _pAd->MlmeAux.CfpPeriod;								\
	_pAd->ActiveCfg.SupRateLen = _pAd->MlmeAux.SupRateLen;								\
	NdisMoveMemory(_pAd->ActiveCfg.SupRate, _pAd->MlmeAux.SupRate, _pAd->MlmeAux.SupRateLen);	\
	_pAd->ActiveCfg.ExtRateLen = _pAd->MlmeAux.ExtRateLen;										\
	NdisMoveMemory(_pAd->ActiveCfg.ExtRate, _pAd->MlmeAux.ExtRate, _pAd->MlmeAux.ExtRateLen);	\
	NdisMoveMemory(&_pAd->PortCfg.APEdcaParm, &_pAd->MlmeAux.APEdcaParm, sizeof(EDCA_PARM));  \
	NdisMoveMemory(&_pAd->PortCfg.APQosCapability, &_pAd->MlmeAux.APQosCapability, sizeof(QOS_CAPABILITY_PARM));  \
	NdisMoveMemory(&_pAd->PortCfg.APQbssLoad, &_pAd->MlmeAux.APQbssLoad, sizeof(QBSS_LOAD_PARM)); \
}

/*
	==========================================================================
	Description:
	==========================================================================
*/
VOID MlmeCntlInit(
	IN PRTMP_ADAPTER pAd, 
	IN STATE_MACHINE *S, 
	OUT STATE_MACHINE_FUNC Trans[]) 
{
	// Control state machine differs from other state machines, the interface 
	// follows the standard interface
	pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
}

/*
	==========================================================================
	Description:
	==========================================================================
*/
VOID MlmeCntlMachinePerformAction(
	IN PRTMP_ADAPTER pAd, 
	IN STATE_MACHINE *S, 
	IN MLME_QUEUE_ELEM *Elem) 
{
	switch(pAd->Mlme.CntlMachine.CurrState) 
	{
		case CNTL_IDLE:
			CntlIdleProc(pAd, Elem);
			break;
		case CNTL_WAIT_DISASSOC:
			CntlWaitDisassocProc(pAd, Elem);
			break;
		case CNTL_WAIT_JOIN:
			CntlWaitJoinProc(pAd, Elem);
			break;
			
		// CNTL_WAIT_REASSOC is the only state in CNTL machine that does
		// not triggered directly or indirectly by "RTMPSetInformation(OID_xxx)". 
		// Therefore not protected by NDIS's "only one outstanding OID request" 
		// rule. Which means NDIS may SET OID in the middle of ROAMing attempts.
		// Current approach is to block new SET request at RTMPSetInformation()
		// when CntlMachine.CurrState is not CNTL_IDLE
		case CNTL_WAIT_REASSOC:
			CntlWaitReassocProc(pAd, Elem);
			break;
			
		case CNTL_WAIT_START:
			CntlWaitStartProc(pAd, Elem);
			break;
		case CNTL_WAIT_AUTH:
			CntlWaitAuthProc(pAd, Elem);
			break;
		case CNTL_WAIT_AUTH2:
			CntlWaitAuthProc2(pAd, Elem);
			break;
		case CNTL_WAIT_ASSOC:
			CntlWaitAssocProc(pAd, Elem);
			break;

		case CNTL_WAIT_OID_LIST_SCAN:
			if(Elem->MsgType == MT2_SCAN_CONF) 
			{
				// Resume TxRing after SCANING complete. We hope the out-of-service time
				// won't be too long to let upper layer time-out the waiting frames
				RTUSBResumeMsduTransmission(pAd);
			
				pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
			}
			break;
			
		case CNTL_WAIT_OID_DISASSOC:
			if (Elem->MsgType == MT2_DISASSOC_CONF) 
			{
				LinkDown(pAd, FALSE);
				pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
			}
			break;

		default:
			DBGPRINT_ERR("!ERROR! CNTL - Illegal message type(=%d)", Elem->MsgType);
			break;
	}
}

/*
	==========================================================================
	Description:
	==========================================================================
*/
VOID CntlIdleProc(
	IN PRTMP_ADAPTER pAd, 
	IN MLME_QUEUE_ELEM *Elem) 
{
	MLME_DISASSOC_REQ_STRUCT   DisassocReq;
		
	if (RTMP_TEST_FLAG(pAd, fRTMP_ADAPTER_RADIO_OFF))
	{
		if (pAd->MlmeAux.CurrReqIsFromNdis)
			pAd->MlmeAux.CurrReqIsFromNdis = FALSE;
		return;
	}
	
	switch(Elem->MsgType) 
	{
		case OID_802_11_SSID:
			CntlOidSsidProc(pAd, Elem);
			break;

		case OID_802_11_BSSID:
			CntlOidRTBssidProc(pAd,Elem);
			break;

		case OID_802_11_BSSID_LIST_SCAN:
			CntlOidScanProc(pAd,Elem);
			break;
		
		case OID_802_11_DISASSOCIATE:
			DisassocParmFill(pAd, &DisassocReq, pAd->PortCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
			MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ, 
						sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
			pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_DISASSOC;
			// Set the AutoReconnectSsid to prevent it reconnect to old SSID
			// Since calling this indicate user don't want to connect to that SSID anymore.
			pAd->MlmeAux.AutoReconnectSsidLen= 32;
			NdisZeroMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.AutoReconnectSsidLen);
			break;

		case MT2_MLME_ROAMING_REQ:
			CntlMlmeRoamingProc(pAd, Elem);
			break;
			
		default:
			DBGPRINT(RT_DEBUG_TRACE, "CNTL - Illegal message in CntlIdleProc(MsgType=%d)\n",Elem->MsgType);
			break;
	}
}

VOID CntlOidScanProc(
	IN PRTMP_ADAPTER pAd,
	IN MLME_QUEUE_ELEM *Elem)
{
	MLME_SCAN_REQ_STRUCT	   ScanReq;
	ULONG					   BssIdx = BSS_NOT_FOUND;
	BSS_ENTRY				   CurrBss;

	DBGPRINT(RT_DEBUG_INFO, "CNTL - SCAN starts\n");

	// record current BSS if network is connected. 
	// 2003-2-13 do not include current IBSS if this is the only STA in this IBSS.
	if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED))
	{
		BssIdx = BssSsidTableSearch(&pAd->ScanTab, pAd->PortCfg.Bssid, pAd->PortCfg.Ssid, pAd->PortCfg.SsidLen, pAd->PortCfg.Channel);
		if (BssIdx != BSS_NOT_FOUND)
		{
			NdisMoveMemory(&CurrBss, &pAd->ScanTab.BssEntry[BssIdx], sizeof(BSS_ENTRY));

			// 2003-2-20 reset this RSSI to a low value but not zero. In normal case, the coming SCAN
			//	   should return a correct RSSI to overwrite this. If no BEEACON received after SCAN, 
			//	   at least we still report a "greater than 0" RSSI since we claim it's CONNECTED.
			//CurrBss.Rssi = pAd->BbpRssiToDbmDelta - 85; // assume -85 dB
		}
	}
			
	// clean up previous SCAN result, add current BSS back to table if any
	BssTableInit(&pAd->ScanTab); 
	if (BssIdx != BSS_NOT_FOUND)
	{
		// DDK Note: If the NIC is associated with a particular BSSID and SSID 
		//	  that are not contained in the list of BSSIDs generated by this scan, the 
		//	  BSSID description of the currently associated BSSID and SSID should be 
		//	  appended to the list of BSSIDs in the NIC's database.
		// To ensure this, we append this BSS as the first entry in SCAN result
		NdisMoveMemory(&pAd->ScanTab.BssEntry[0], &CurrBss, sizeof(BSS_ENTRY));
		pAd->ScanTab.BssNr = 1;
	}

	ScanParmFill(pAd, &ScanReq, "", 0, BSS_ANY, SCAN_PASSIVE);
	MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_SCAN_REQ, 
				sizeof(MLME_SCAN_REQ_STRUCT), &ScanReq);
	pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_LIST_SCAN;
}

/*
	==========================================================================
	Description:
		Before calling this routine, user desired SSID should already been
		recorded in PortCfg.Ssid[]
	==========================================================================
*/
VOID CntlOidSsidProc(
	IN PRTMP_ADAPTER pAd, 
	IN MLME_QUEUE_ELEM * Elem) 
{
    PNDIS_802_11_SSID		   pOidSsid = (NDIS_802_11_SSID *)Elem->Msg;
	MLME_DISASSOC_REQ_STRUCT   DisassocReq;
	ULONG					   Now;

	
	// Step 1. record the desired user settings to MlmeAux
	NdisMoveMemory(pAd->MlmeAux.Ssid, pOidSsid->Ssid, pOidSsid->SsidLength);
	pAd->MlmeAux.SsidLen = (UCHAR)pOidSsid->SsidLength;
	NdisZeroMemory(pAd->MlmeAux.Bssid, MAC_ADDR_LEN);
	pAd->MlmeAux.BssType = pAd->PortCfg.BssType;
		
	//
	// Update Reconnect Ssid, that user desired to connect.
	//
	NdisMoveMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
	pAd->MlmeAux.AutoReconnectSsidLen = pAd->MlmeAux.SsidLen;
	

	// step 2. find all matching BSS in the lastest SCAN result (inBssTab) 
	//	  & log them into MlmeAux.SsidBssTab for later-on iteration. Sort by RSSI order
	BssTableSsidSort(pAd, &pAd->MlmeAux.SsidBssTab, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);

	DBGPRINT(RT_DEBUG_TRACE, "CNTL - %d BSS match the desire SSID - %s\n",pAd->MlmeAux.SsidBssTab.BssNr, pAd->MlmeAux.Ssid);

	Now = jiffies;

	if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED) && 
		(pAd->PortCfg.SsidLen == pAd->MlmeAux.SsidBssTab.BssEntry[0].SsidLen) &&
		NdisEqualMemory(pAd->PortCfg.Ssid, pAd->MlmeAux.SsidBssTab.BssEntry[0].Ssid, pAd->PortCfg.SsidLen) &&
		MAC_ADDR_EQUAL(pAd->PortCfg.Bssid, pAd->MlmeAux.SsidBssTab.BssEntry[0].Bssid))
	{
		// Case 1. already connected with an AP who has the desired SSID 
		//		   with highest RSSI
		
		if (((pAd->PortCfg.AuthMode == Ndis802_11AuthModeWPA)	 ||
			 (pAd->PortCfg.AuthMode == Ndis802_11AuthModeWPAPSK) ||
			 (pAd->PortCfg.AuthMode == Ndis802_11AuthModeWPA2)	 ||
			 (pAd->PortCfg.AuthMode == Ndis802_11AuthModeWPA2PSK)
#if WPA_SUPPLICANT_SUPPORT
			  || (pAd->PortCfg.IEEE8021X == TRUE)		
#endif 			 
			 )  &&
			 (pAd->PortCfg.PortSecured == WPA_802_1X_PORT_NOT_SECURED))
		{
			// case 1.1 For WPA, WPA-PSK, if the 1x port is not secured, we have to redo 
			//			connection process
			DBGPRINT(RT_DEBUG_TRACE, "CNTL - disassociate with current AP...\n");
			DisassocParmFill(pAd, &DisassocReq, pAd->PortCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
			MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ, 
						sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
			pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
		}
		else if (pAd->bConfigChanged == TRUE)
		{
			// case 1.2 Important Config has changed, we have to reconnect to the same AP
			DBGPRINT(RT_DEBUG_TRACE, "CNTL - disassociate with current AP Because config changed...\n");
			DisassocParmFill(pAd, &DisassocReq, pAd->PortCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
			MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ, 
						sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
			pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
		}
		else
		{
			// case 1.3. already connected to the SSID with highest RSSI.
			DBGPRINT(RT_DEBUG_TRACE, "CNTL - already with this BSSID. ignore this SET_SSID request\n");


			// We only check if same to the BSSID with highest RSSI.
			// If roaming of same SSID required, we still do the reconnection.
			// same BSSID, go back to idle state directly
			if (pAd->MlmeAux.CurrReqIsFromNdis)
			{
			}
			pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
		} 
	} 
	else if (INFRA_ON(pAd)) 
	{
		// case 2. active INFRA association existent
		//	  roaming is done within miniport driver, nothing to do with configuration
		//	  utility. so upon a new SET(OID_802_11_SSID) is received, we just 
		//	  disassociate with the current associated AP, 
		//	  then perform a new association with this new SSID, no matter the 
		//	  new/old SSID are the same or not.
		DBGPRINT(RT_DEBUG_TRACE, "CNTL - disassociate with current AP...\n");
		DisassocParmFill(pAd, &DisassocReq, pAd->PortCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
		MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ, 
					sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
		pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
	}
	else
	{	
		if (ADHOC_ON(pAd))
		{
			DBGPRINT(RT_DEBUG_TRACE, "CNTL - drop current ADHOC\n");
			LinkDown(pAd, FALSE);
			OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
			DBGPRINT(RT_DEBUG_TRACE, "NDIS_STATUS_MEDIA_DISCONNECT Event C!\n");
		}

		if ((pAd->MlmeAux.SsidBssTab.BssNr == 0) && 
			(pAd->PortCfg.bAutoReconnect == TRUE) && 
			(pAd->MlmeAux.BssType == BSS_INFRA) &&
			(MlmeValidateSSID(pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen) == TRUE))
		{
			MLME_SCAN_REQ_STRUCT	   ScanReq;

			DBGPRINT(RT_DEBUG_TRACE, "CNTL - No matching BSS, start a new scan\n");

			
			ScanParmFill(pAd, &ScanReq, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen, BSS_ANY, SCAN_ACTIVE);
			MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_SCAN_REQ, 
						sizeof(MLME_SCAN_REQ_STRUCT), &ScanReq);
			pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_LIST_SCAN;
			
			// Reset Missed scan number
			pAd->PortCfg.LastScanTime = Now;
		}
		else
		{
			pAd->MlmeAux.BssIdx = 0;

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲精品乱码久久久久久黑人| 国产成人在线视频免费播放| 国内精品视频666| av在线综合网| 日韩欧美国产一二三区| 亚洲精品大片www| 高清av一区二区| 日韩精品一区二区在线| 亚洲一区二区美女| 大尺度一区二区| 亚洲精品一区二区三区在线观看 | 国产欧美一区二区精品性| 日韩国产欧美在线视频| 色天天综合色天天久久| 中文字幕av不卡| 韩国精品一区二区| 91精品国产综合久久精品图片| 亚洲免费观看高清| 99久久免费精品高清特色大片| 精品福利一二区| 久久国产日韩欧美精品| 91精品国产手机| 婷婷国产v国产偷v亚洲高清| 99久久精品国产观看| 国产性做久久久久久| 激情欧美一区二区三区在线观看| 欧美一区二区免费视频| 五月天亚洲婷婷| 69堂国产成人免费视频| 午夜精品在线看| 欧美精品777| 首页亚洲欧美制服丝腿| 91麻豆精品国产自产在线观看一区| 日韩av不卡在线观看| 欧洲国内综合视频| 亚洲国产cao| 在线观看国产一区二区| 亚洲激情自拍视频| 欧美日韩卡一卡二| 日日嗨av一区二区三区四区| 欧美一级精品在线| 九九精品视频在线看| 精品国产亚洲一区二区三区在线观看| 三级亚洲高清视频| 欧美大片日本大片免费观看| 狠狠色丁香婷婷综合| 国产午夜精品久久| 99久久精品免费观看| 一区二区三区欧美亚洲| 欧美日韩在线免费视频| 免费精品视频在线| 久久这里只有精品6| 高清av一区二区| 亚洲激情图片一区| 欧美精品少妇一区二区三区| 久久精工是国产品牌吗| 中文天堂在线一区| 色综合天天综合| 日韩电影一区二区三区| 欧美成人一级视频| av电影天堂一区二区在线观看| 亚洲午夜私人影院| 精品88久久久久88久久久| 91在线国产福利| 男男gaygay亚洲| 18成人在线观看| 日韩女优视频免费观看| 97久久精品人人澡人人爽| 天天综合日日夜夜精品| 国产精品欧美极品| 56国语精品自产拍在线观看| 成人精品一区二区三区中文字幕| 亚洲一区二区四区蜜桃| 久久精品水蜜桃av综合天堂| 91国偷自产一区二区三区成为亚洲经典 | 国产精品婷婷午夜在线观看| 国产午夜精品久久| 欧亚洲嫩模精品一区三区| 极品美女销魂一区二区三区免费| 中文字幕一区二区三中文字幕| 欧美男男青年gay1069videost | 精品成人在线观看| 色成年激情久久综合| 国内精品国产成人国产三级粉色| 亚洲美女淫视频| 国产亚洲制服色| 91麻豆精品国产91| 色视频欧美一区二区三区| 国产一区二区三区在线观看免费| 亚洲一级二级三级在线免费观看| 久久精品亚洲乱码伦伦中文| 日韩视频国产视频| 欧美精品第一页| 一本到三区不卡视频| 国产成人免费高清| 美女视频黄 久久| 亚洲成a人v欧美综合天堂| 国产精品国模大尺度视频| 久久久久久久久久久久久夜| 日韩丝袜美女视频| 91麻豆精品国产91久久久| 欧美日韩三级在线| 91国内精品野花午夜精品| 99re亚洲国产精品| 成人教育av在线| 国产盗摄一区二区三区| 国产综合一区二区| 精品一二线国产| 麻豆成人av在线| 美女视频黄免费的久久| 蜜桃一区二区三区在线| 奇米一区二区三区| 日韩精品久久久久久| 日日摸夜夜添夜夜添亚洲女人| 亚洲成人777| 五月天网站亚洲| 青青草原综合久久大伊人精品优势| 婷婷夜色潮精品综合在线| 婷婷六月综合网| 免费三级欧美电影| 在线精品视频免费观看| 99久久精品国产导航| 97久久精品人人做人人爽50路| 99精品欧美一区二区三区小说| youjizz久久| 色婷婷综合在线| 欧美日韩在线电影| 91精品午夜视频| 精品久久久久久久人人人人传媒| 精品久久一区二区| 久久久精品日韩欧美| 国产欧美一区二区三区沐欲 | 亚洲摸摸操操av| 亚洲一区电影777| 奇米在线7777在线精品| 国产盗摄女厕一区二区三区 | 一本一本久久a久久精品综合麻豆| 色婷婷久久久亚洲一区二区三区 | 国产另类ts人妖一区二区| 成人性生交大片免费看中文网站| 成人高清视频免费观看| 欧美性受极品xxxx喷水| 日韩三级视频在线看| 精品电影一区二区三区| 欧美性大战久久久久久久| 亚洲视频你懂的| 一区二区三区在线影院| 日韩电影在线免费| 懂色一区二区三区免费观看| 欧美性大战久久| 337p粉嫩大胆噜噜噜噜噜91av| 国产精品萝li| 免费看精品久久片| bt7086福利一区国产| 日韩亚洲欧美一区| 中文字幕av一区 二区| 亚洲18女电影在线观看| 在线成人小视频| 色偷偷一区二区三区| 91社区在线播放| 欧美在线影院一区二区| 欧美揉bbbbb揉bbbbb| 欧美久久久久久蜜桃| 日韩三级av在线播放| 精品国产三级电影在线观看| 国产婷婷一区二区| 中文欧美字幕免费| 午夜精品一区二区三区三上悠亚| 爽好久久久欧美精品| 六月丁香婷婷色狠狠久久| 狠狠色狠狠色合久久伊人| 国产成人精品aa毛片| 91小宝寻花一区二区三区| 欧美性猛交xxxx乱大交退制版| 91精品欧美久久久久久动漫| 欧美不卡一区二区三区四区| 国产精品久久久久久久久免费樱桃| 国产精品美女www爽爽爽| 亚洲欧美精品午睡沙发| 爽好多水快深点欧美视频| 国产一区二区三区蝌蚪| av电影天堂一区二区在线| 欧美性xxxxx极品少妇| 日韩色视频在线观看| 国产精品第一页第二页第三页| 一区二区三区四区亚洲| 久久91精品久久久久久秒播| 成人99免费视频| 欧美精品v日韩精品v韩国精品v| 久久久91精品国产一区二区三区| 亚洲欧美另类小说| 国产美女娇喘av呻吟久久| 色哟哟一区二区| 久久久久久久久伊人| 亚洲一区二区精品视频| 风间由美一区二区三区在线观看| 欧美日韩日本视频| 国产日本欧美一区二区| 日韩av不卡在线观看| 95精品视频在线|