亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? decompress.c

?? 針對(duì)德州儀器DM270開(kāi)發(fā)板的bootloader,其實(shí)現(xiàn)了內(nèi)核的下載以及文件系統(tǒng)的下載
?? C
?? 第 1 頁(yè) / 共 3 頁(yè)
字號(hào):
/* * decompress.c * * from uclinux 2.4.19-uc1 arch/armnommu/boot/compressed/misc.c and * lib/inflate.c *  * This is a collection of several routines from gzip-1.0.3  * adapted for Linux. * * malloc by Hannu Savolainen 1993 and Matthias Urlichs 1994 * * Modified for ARM Linux by Russell King * * Nicolas Pitre <nico@visuaide.com>  1999/04/14 : *  For this code to run directly from Flash, all constant variables must *  be marked with 'const' and all other variables initialized at run-time  *  only.  This way all non constant variables will end up in the bss segment, *  which should point to addresses in RAM and cleared to 0 on start. *  This allows for a much quicker boot time. */#include "decompress.h"#include "util.h"#define puts util_printf/* * Optimised C version of memzero for the ARM. */void memzero (void *s, long n){	union { void *vp; unsigned long *ulp; unsigned char *ucp; } u;	int i;	u.vp = s;	for (i = n >> 5; i > 0; i--) {		*u.ulp++ = 0;		*u.ulp++ = 0;		*u.ulp++ = 0;		*u.ulp++ = 0;		*u.ulp++ = 0;		*u.ulp++ = 0;		*u.ulp++ = 0;		*u.ulp++ = 0;	}	if (n & 1 << 4) {		*u.ulp++ = 0;		*u.ulp++ = 0;		*u.ulp++ = 0;		*u.ulp++ = 0;	}	if (n & 1 << 3) {		*u.ulp++ = 0;		*u.ulp++ = 0;	}	if (n & 1 << 2)		*u.ulp++ = 0;	if (n & 1 << 1) {		*u.ucp++ = 0;		*u.ucp++ = 0;	}	if (n & 1)		*u.ucp++ = 0;}/* __inline__ */ void *my_memcpy(void *__dest, const void *__src, long __n){	int i = 0;	unsigned char *d = (unsigned char *)__dest, *s = (unsigned char *)__src;	for (i = __n >> 3; i > 0; i--) {		*d++ = *s++;		*d++ = *s++;		*d++ = *s++;		*d++ = *s++;		*d++ = *s++;		*d++ = *s++;		*d++ = *s++;		*d++ = *s++;	}	if (__n & 1 << 2) {		*d++ = *s++;		*d++ = *s++;		*d++ = *s++;		*d++ = *s++;	}	if (__n & 1 << 1) {		*d++ = *s++;		*d++ = *s++;	}	if (__n & 1)		*d++ = *s++;	return __dest;}/* * gzip delarations */#define OF(args)  argstypedef unsigned char  uch;typedef unsigned short ush;typedef unsigned long  ulg;#define WSIZE 0x8000		/* Window size must be at least 32k, */				/* and a power of two */static uch *inbuf;		/* input buffer */static uch window[WSIZE];	/* Sliding window buffer */static unsigned insize;		/* valid bytes in inbuf */static unsigned inptr;		/* index of next byte to be processed in inbuf */static unsigned outcnt;		/* bytes in output buffer *//* gzip flag byte */#define ASCII_FLAG   0x01 /* bit 0 set: file probably ascii text */#define CONTINUATION 0x02 /* bit 1 set: continuation of multi-part gzip file */#define EXTRA_FIELD  0x04 /* bit 2 set: extra field present */#define ORIG_NAME    0x08 /* bit 3 set: original file name present */#define COMMENT      0x10 /* bit 4 set: file comment present */#define ENCRYPTED    0x20 /* bit 5 set: file is encrypted */#define RESERVED     0xC0 /* bit 6,7:   reserved */#define get_byte()  (inptr < insize ? inbuf[inptr++] : fill_inbuf())/* Diagnostic functions */#ifdef DEBUG#  define Assert(cond,msg) {if(!(cond)) error(msg);}#  define Trace(x) fprintf x#  define Tracev(x) {if (verbose) fprintf x ;}#  define Tracevv(x) {if (verbose>1) fprintf x ;}#  define Tracec(c,x) {if (verbose && (c)) fprintf x ;}#  define Tracecv(c,x) {if (verbose>1 && (c)) fprintf x ;}#else#  define Assert(cond,msg)#  define Trace(x)#  define Tracev(x)#  define Tracevv(x)#  define Tracec(c,x)#  define Tracecv(c,x)#endifstatic int  fill_inbuf(void);static void flush_window(void);static void gzip_mark(void **);static void gzip_release(void **);static char *input_data;static char *input_data_end;static uch *output_data;static ulg output_ptr;static ulg bytes_out;static void *malloc(int size);static void free(void *where);static void error(char *m);static void gzip_mark(void **);static void gzip_release(void **);extern int end;static ulg free_mem_ptr;static ulg free_mem_ptr_end;#define HEAP_SIZE 0x2000#define DEBG(x)#define DEBG1(x)/* inflate.c -- Not copyrighted 1992 by Mark Adler   version c10p1, 10 January 1993 *//*  * Adapted for booting Linux by Hannu Savolainen 1993 * based on gzip-1.0.3  * * Nicolas Pitre <nico@cam.org>, 1999/04/14 : *   Little mods for all variable to reside either into rodata or bss segments *   by marking constant variables with 'const' and initializing all the others *   at run-time only.  This allows for the kernel uncompressor to run *   directly from Flash or ROM memory on embedded systems. *//*   Inflate deflated (PKZIP's method 8 compressed) data.  The compression   method searches for as much of the current string of bytes (up to a   length of 258) in the previous 32 K bytes.  If it doesn't find any   matches (of at least length 3), it codes the next byte.  Otherwise, it   codes the length of the matched string and its distance backwards from   the current position.  There is a single Huffman code that codes both   single bytes (called "literals") and match lengths.  A second Huffman   code codes the distance information, which follows a length code.  Each   length or distance code actually represents a base value and a number   of "extra" (sometimes zero) bits to get to add to the base value.  At   the end of each deflated block is a special end-of-block (EOB) literal/   length code.  The decoding process is basically: get a literal/length   code; if EOB then done; if a literal, emit the decoded byte; if a   length then get the distance and emit the referred-to bytes from the   sliding window of previously emitted data.   There are (currently) three kinds of inflate blocks: stored, fixed, and   dynamic.  The compressor deals with some chunk of data at a time, and   decides which method to use on a chunk-by-chunk basis.  A chunk might   typically be 32 K or 64 K.  If the chunk is incompressible, then the   "stored" method is used.  In this case, the bytes are simply stored as   is, eight bits per byte, with none of the above coding.  The bytes are   preceded by a count, since there is no longer an EOB code.   If the data is compressible, then either the fixed or dynamic methods   are used.  In the dynamic method, the compressed data is preceded by   an encoding of the literal/length and distance Huffman codes that are   to be used to decode this block.  The representation is itself Huffman   coded, and so is preceded by a description of that code.  These code   descriptions take up a little space, and so for small blocks, there is   a predefined set of codes, called the fixed codes.  The fixed method is   used if the block codes up smaller that way (usually for quite small   chunks), otherwise the dynamic method is used.  In the latter case, the   codes are customized to the probabilities in the current block, and so   can code it much better than the pre-determined fixed codes.    The Huffman codes themselves are decoded using a multi-level table   lookup, in order to maximize the speed of decoding plus the speed of   building the decoding tables.  See the comments below that precede the   lbits and dbits tuning parameters. *//*   Notes beyond the 1.93a appnote.txt:   1. Distance pointers never point before the beginning of the output      stream.   2. Distance pointers can point back across blocks, up to 32k away.   3. There is an implied maximum of 7 bits for the bit length table and      15 bits for the actual data.   4. If only one code exists, then it is encoded using one bit.  (Zero      would be more efficient, but perhaps a little confusing.)  If two      codes exist, they are coded using one bit each (0 and 1).   5. There is no way of sending zero distance codes--a dummy must be      sent if there are none.  (History: a pre 2.0 version of PKZIP would      store blocks with no distance codes, but this was discovered to be      too harsh a criterion.)  Valid only for 1.93a.  2.04c does allow      zero distance codes, which is sent as one code of zero bits in      length.   6. There are up to 286 literal/length codes.  Code 256 represents the      end-of-block.  Note however that the static length tree defines      288 codes just to fill out the Huffman codes.  Codes 286 and 287      cannot be used though, since there is no length base or extra bits      defined for them.  Similarly, there are up to 30 distance codes.      However, static trees define 32 codes (all 5 bits) to fill out the      Huffman codes, but the last two had better not show up in the data.   7. Unzip can check dynamic Huffman blocks for complete code sets.      The exception is that a single code would not be complete (see #4).   8. The five bits following the block type is really the number of      literal codes sent minus 257.   9. Length codes 8,16,16 are interpreted as 13 length codes of 8 bits      (1+6+6).  Therefore, to output three times the length, you output      three codes (1+1+1), whereas to output four times the same length,      you only need two codes (1+3).  Hmm.  10. In the tree reconstruction algorithm, Code = Code + Increment      only if BitLength(i) is not zero.  (Pretty obvious.)  11. Correction: 4 Bits: # of Bit Length codes - 4     (4 - 19)  12. Note: length code 284 can represent 227-258, but length code 285      really is 258.  The last length deserves its own, short code      since it gets used a lot in very redundant files.  The length      258 is special since 258 - 3 (the min match length) is 255.  13. The literal/length and distance code bit lengths are read as a      single stream of lengths.  It is possible (and advantageous) for      a repeat code (16, 17, or 18) to go across the boundary between      the two sets of lengths. */#define slide window/* Huffman code lookup table entry--this entry is four bytes for machines   that have 16-bit pointers (e.g. PC's in the small or medium model).   Valid extra bits are 0..13.  e == 15 is EOB (end of block), e == 16   means that v is a literal, 16 < e < 32 means that v is a pointer to   the next table, which codes e - 16 bits, and lastly e == 99 indicates   an unused code.  If a code with e == 99 is looked up, this implies an   error in the data. */struct huft {  uch e;                /* number of extra bits or operation */  uch b;                /* number of bits in this code or subcode */  union {    ush n;              /* literal, length base, or distance base */    struct huft *t;     /* pointer to next level of table */  } v;};/* Function prototypes */static int huft_build OF((unsigned *, unsigned, unsigned, 		const ush *, const ush *, struct huft **, int *));static int huft_free OF((struct huft *));static int inflate_codes OF((struct huft *, struct huft *, int, int));static int inflate_stored OF((void));static int inflate_fixed OF((void));static int inflate_dynamic OF((void));static int inflate_block OF((int *));static int inflate OF((void));/* The inflate algorithm uses a sliding 32 K byte window on the uncompressed   stream to find repeated byte strings.  This is implemented here as a   circular buffer.  The index is updated simply by incrementing and then   ANDing with 0x7fff (32K-1). *//* It is left to other modules to supply the 32 K area.  It is assumed   to be usable as if it were declared "uch slide[32768];" or as just   "uch *slide;" and then malloc'ed in the latter case.  The definition   must be in unzip.h, included above. *//* unsigned wp;             current position in slide */#define wp outcnt#define flush_output(w) (wp=(w),flush_window())/* Tables for deflate from PKZIP's appnote.txt. */static const unsigned border[] = {    /* Order of the bit length code lengths */        16, 17, 18, 0, 8, 7, 9, 6, 10, 5, 11, 4, 12, 3, 13, 2, 14, 1, 15};static const ush cplens[] = {         /* Copy lengths for literal codes 257..285 */        3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 15, 17, 19, 23, 27, 31,        35, 43, 51, 59, 67, 83, 99, 115, 131, 163, 195, 227, 258, 0, 0};        /* note: see note #13 above about the 258 in this list. */static const ush cplext[] = {         /* Extra bits for literal codes 257..285 */        0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 2, 2, 2, 2,        3, 3, 3, 3, 4, 4, 4, 4, 5, 5, 5, 5, 0, 99, 99}; /* 99==invalid */static const ush cpdist[] = {         /* Copy offsets for distance codes 0..29 */        1, 2, 3, 4, 5, 7, 9, 13, 17, 25, 33, 49, 65, 97, 129, 193,        257, 385, 513, 769, 1025, 1537, 2049, 3073, 4097, 6145,        8193, 12289, 16385, 24577};static const ush cpdext[] = {         /* Extra bits for distance codes */        0, 0, 0, 0, 1, 1, 2, 2, 3, 3, 4, 4, 5, 5, 6, 6,        7, 7, 8, 8, 9, 9, 10, 10, 11, 11,        12, 12, 13, 13};/* Macros for inflate() bit peeking and grabbing.   The usage is:           NEEDBITS(j)        x = b & mask_bits[j];        DUMPBITS(j)   where NEEDBITS makes sure that b has at least j bits in it, and   DUMPBITS removes the bits from b.  The macros use the variable k   for the number of bits in b.  Normally, b and k are register   variables for speed, and are initialized at the beginning of a   routine that uses these macros from a global bit buffer and count.   If we assume that EOB will be the longest code, then we will never   ask for bits with NEEDBITS that are beyond the end of the stream.   So, NEEDBITS should not read any more bytes than are needed to   meet the request.  Then no bytes need to be "returned" to the buffer   at the end of the last block.   However, this assumption is not true for fixed blocks--the EOB code   is 7 bits, but the other literal/length codes can be 8 or 9 bits.   (The EOB code is shorter than other codes because fixed blocks are   generally short.  So, while a block always has an EOB, many other   literal/length codes have a significantly lower probability of   showing up at all.)  However, by making the first table have a   lookup of seven bits, the EOB code will be found in that first   lookup, and so will not require that too many bits be pulled from   the stream. */static ulg bb;                         /* bit buffer */static unsigned bk;                    /* bits in bit buffer */static const ush mask_bits[] = {    0x0000,    0x0001, 0x0003, 0x0007, 0x000f, 0x001f, 0x003f, 0x007f, 0x00ff,    0x01ff, 0x03ff, 0x07ff, 0x0fff, 0x1fff, 0x3fff, 0x7fff, 0xffff};#define NEXTBYTE()  (uch)get_byte()#define NEEDBITS(n) {while(k<(n)){b|=((ulg)NEXTBYTE())<<k;k+=8;}}#define DUMPBITS(n) {b>>=(n);k-=(n);}/*   Huffman code decoding is performed using a multi-level table lookup.   The fastest way to decode is to simply build a lookup table whose   size is determined by the longest code.  However, the time it takes   to build this table can also be a factor if the data being decoded   is not very long.  The most common codes are necessarily the   shortest codes, so those codes dominate the decoding time, and hence   the speed.  The idea is you can have a shorter table that decodes the   shorter, more probable codes, and then point to subsidiary tables for   the longer codes.  The time it costs to decode the longer codes is   then traded against the time it takes to make longer tables.   This results of this trade are in the variables lbits and dbits   below.  lbits is the number of bits the first level table for literal/   length codes can decode in one step, and dbits is the same thing for   the distance codes.  Subsequent tables are also less than or equal to   those sizes.  These values may be adjusted either when all of the   codes are shorter than that, in which case the longest code length in   bits is used, or when the shortest code is *longer* than the requested   table size, in which case the length of the shortest code in bits is   used.   There are two different values for the two tables, since they code a   different number of possibilities each.  The literal/length table   codes 286 possible values, or in a flat code, a little over eight   bits.  The distance table codes 30 possible values, or a little less   than five bits, flat.  The optimum values for speed end up being   about one bit more than those, so lbits is 8+1 and dbits is 5+1.   The optimum values may differ though from machine to machine, and   possibly even between compilers.  Your mileage may vary. */static const int lbits = 9;          /* bits in base literal/length lookup table */static const int dbits = 6;          /* bits in base distance lookup table *//* If BMAX needs to be larger than 16, then h and x[] should be ulg. */#define BMAX 16         /* maximum bit length of any code (16 for explode) */#define N_MAX 288       /* maximum number of codes in any set */static unsigned hufts;         /* track memory usage */static int huft_build(b, n, s, d, e, t, m)unsigned *b;            /* code lengths in bits (all assumed <= BMAX) */unsigned n;             /* number of codes (assumed <= N_MAX) */unsigned s;             /* number of simple-valued codes (0..s-1) */const ush *d;                 /* list of base values for non-simple codes */const ush *e;                 /* list of extra bits for non-simple codes */struct huft **t;        /* result: starting table */int *m;                 /* maximum lookup bits, returns actual *//* Given a list of code lengths and a maximum table size, make a set of   tables to decode that set of codes.  Return zero on success, one if   the given code set is incomplete (the tables are still built in this   case), two if the input is invalid (all zero length codes or an   oversubscribed set of lengths), and three if not enough memory. */{  unsigned a;                   /* counter for codes of length k */  unsigned c[BMAX+1];           /* bit length count table */  unsigned f;                   /* i repeats in table every f entries */  int g;                        /* maximum code length */  int h;                        /* table level */  register unsigned i;          /* counter, current code */  register unsigned j;          /* counter */  register int k;               /* number of bits in current code */  int l;                        /* bits per table (returned in m) */  register unsigned *p;         /* pointer into c[], b[], or v[] */  register struct huft *q;      /* points to current table */  struct huft r;                /* table entry for structure assignment */  struct huft *u[BMAX];         /* table stack */  unsigned v[N_MAX];            /* values in order of bit length */  register int w;               /* bits before this table == (l * h) */  unsigned x[BMAX+1];           /* bit offsets, then code stack */  unsigned *xp;                 /* pointer into x */  int y;                        /* number of dummy codes added */  unsigned z;                   /* number of entries in current table */DEBG("huft1 ");  /* Generate counts for each bit length */  memzero(c, sizeof(c));  p = b;  i = n;  do {    Tracecv(*p, (stderr, (n-i >= ' ' && n-i <= '~' ? "%c %d\n" : "0x%x %d\n"), 	    n-i, *p));    c[*p]++;                    /* assume all entries <= BMAX */    p++;                      /* Can't combine with above line (Solaris bug) */  } while (--i);  if (c[0] == n)                /* null input--all zero length codes */  {    *t = (struct huft *)NULL;    *m = 0;    return 0;  }DEBG("huft2 ");

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美片网站yy| 欧美主播一区二区三区| 国产成人亚洲综合a∨猫咪 | 亚洲国产高清不卡| 亚洲一区免费在线观看| 久久不见久久见免费视频7| 成人国产亚洲欧美成人综合网| 欧美性感一区二区三区| 精品国产亚洲在线| 亚洲人xxxx| 蜜臀久久久99精品久久久久久| 成人久久18免费网站麻豆| 欧美性猛交xxxx乱大交退制版| 欧美成va人片在线观看| 亚洲激情六月丁香| 国产一区三区三区| 在线亚洲欧美专区二区| 久久无码av三级| 亚洲一二三区在线观看| 国产高清在线精品| 欧美群妇大交群的观看方式| 国产精品三级久久久久三级| 人人超碰91尤物精品国产| 欧美日韩亚洲综合一区二区三区| 久久久久久黄色| 亚洲精品第一国产综合野| 国产精品美女久久久久高潮| 免费在线看一区| 色女孩综合影院| 久久久国际精品| 91亚洲永久精品| 日韩精品在线一区二区| 亚洲综合999| av资源网一区| 2021久久国产精品不只是精品| 亚洲一区欧美一区| av一本久道久久综合久久鬼色| 精品久久久三级丝袜| 午夜久久电影网| 色8久久精品久久久久久蜜| 欧美激情一区二区三区四区| 蜜臀99久久精品久久久久久软件| 欧洲一区二区三区免费视频| 欧美国产一区在线| 国产一区二区视频在线| 日韩欧美一级二级三级| 日产欧产美韩系列久久99| 色94色欧美sute亚洲线路二| 国产精品的网站| 国产精品123| 久久久91精品国产一区二区精品 | 久久久不卡网国产精品一区| 偷窥少妇高潮呻吟av久久免费| 成人小视频免费在线观看| 精品国产百合女同互慰| 美女在线视频一区| 日韩欧美一二区| 日韩高清在线不卡| 欧美理论电影在线| 午夜婷婷国产麻豆精品| 欧美亚洲综合在线| 亚洲一区二区三区四区在线免费观看 | 欧美在线不卡一区| 17c精品麻豆一区二区免费| 国产一区二区电影| 久久这里只有精品视频网| 激情久久五月天| 欧美α欧美αv大片| 色妞www精品视频| 亚洲少妇30p| 91视频免费观看| 夜夜夜精品看看| 欧美三级电影精品| 日韩电影在线观看网站| 日韩三级伦理片妻子的秘密按摩| 久久精品人人做人人爽人人| 久久精品国产免费看久久精品| 欧美精品第1页| 日本成人中文字幕在线视频 | 乱中年女人伦av一区二区| 日韩三级精品电影久久久| 精油按摩中文字幕久久| 久久久久久久综合狠狠综合| 国产精品99久久久久久似苏梦涵| 日本一区二区三级电影在线观看| 国产精品一二三| 中文av一区二区| 色久综合一二码| 日精品一区二区| 2022国产精品视频| 不卡欧美aaaaa| 亚洲小说欧美激情另类| 日韩欧美国产wwwww| 国产精品18久久久久久久久 | 欧美在线观看一二区| 五月综合激情婷婷六月色窝| 欧美成人精品1314www| 国产高清一区日本| 亚洲精品国产一区二区精华液| 欧美日韩视频在线一区二区| 久久精品国产秦先生| 国产精品久久久久影院老司| 狠狠久久亚洲欧美| 亚洲一区二区欧美| 色综合天天综合网天天看片| 国产精品免费看片| 欧洲一区二区三区在线| 麻豆专区一区二区三区四区五区| 久久久欧美精品sm网站| 91猫先生在线| 捆绑变态av一区二区三区| 国产精品毛片大码女人| 欧美日韩一区二区电影| 国产资源精品在线观看| 最新国产の精品合集bt伙计| 欧美妇女性影城| 国产成人av资源| 五月综合激情网| 国产清纯白嫩初高生在线观看91| 欧美在线观看视频一区二区 | www日韩大片| 色综合色狠狠综合色| 久久国产免费看| 一区二区三区精密机械公司| 欧美mv日韩mv亚洲| 在线视频观看一区| 国产精品一级在线| 天使萌一区二区三区免费观看| 中文字幕av免费专区久久| 欧美精品三级日韩久久| 99久久夜色精品国产网站| 麻豆精品精品国产自在97香蕉| 日韩一区中文字幕| 久久这里只有精品视频网| 欧美三区在线视频| 国产成人精品亚洲日本在线桃色| 亚洲成av人片一区二区三区| 中文欧美字幕免费| 日韩精品专区在线影院重磅| 色噜噜夜夜夜综合网| 国产久卡久卡久卡久卡视频精品| 午夜精品久久久久久久99水蜜桃| 国产精品美日韩| 精品国产凹凸成av人导航| 欧美群妇大交群的观看方式| 99久久精品99国产精品| 国产美女一区二区三区| 免费不卡在线观看| 亚洲成a人片在线不卡一二三区 | 欧洲另类一二三四区| 高潮精品一区videoshd| 久久成人综合网| 国产福利一区二区三区视频| 日韩专区一卡二卡| 亚洲综合偷拍欧美一区色| 国产精品伦理一区二区| 亚洲精品一区二区三区蜜桃下载 | 久久99久久99小草精品免视看| 亚洲已满18点击进入久久| 国产精品成人网| 中文字幕第一区| 国产欧美一区二区精品性色| 欧美电影一区二区| 欧美日韩性生活| 在线看国产一区| 91福利在线看| 在线观看区一区二| 色婷婷综合久久久中文一区二区| 成人性视频免费网站| 高清成人在线观看| 国产成人亚洲综合a∨婷婷图片| 黄色成人免费在线| 美女一区二区在线观看| 青青草精品视频| 日本欧美在线看| 蜜臀av一区二区在线观看 | 久久嫩草精品久久久精品一| 日韩欧美中文一区二区| 欧美一区二区三区喷汁尤物| 欧美人牲a欧美精品| 91精品国产综合久久精品| 8x8x8国产精品| 日韩一区二区中文字幕| 欧美成人官网二区| xnxx国产精品| 国产精品三级av| 自拍av一区二区三区| 亚洲欧美色图小说| 夜夜嗨av一区二区三区中文字幕 | 国产精品麻豆视频| 中文字幕免费观看一区| 亚洲欧洲日产国码二区| 亚洲欧洲成人精品av97| 亚洲精品乱码久久久久| 亚洲成a人片在线不卡一二三区| 午夜视频一区二区三区| 久久99精品国产麻豆婷婷| 国产精品综合一区二区| www.日韩精品| 欧美三级三级三级|