亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? certcreate.cpp

?? 用于處理證書請求,生成證書的CA服務器源碼,
?? CPP
?? 第 1 頁 / 共 5 頁
字號:
#ifndef _WIN32_WINNT
#define _WIN32_WINNT 0x0400
#endif

#include <stdio.h>
#include <string.h>
#include <windows.h>
#include <wincrypt.h>
#include <Rpcdce.h>

#include "certcreate.h"
#include "certtools.h"
#include "certglobal.h"

LPSTR szIssuerStore = "FGC_CA_STORE3";//"FGC_CA_STORE2";//"MY";
LPSTR szSignStore = "FGC_CA_MASTER3";//"FGC_CA_MASTER";	//用于存放簽名證書的STORE
LPSTR szSignContainer = "FGC_CA_MASTER_CONTAINER3";//"FGC_CA_MASTER_CONTAINER"; //用于簽名證書的CONTAINER
LPSTR szContainer = "FGKeyContainerTest3";//"FGKeyContainerTest";
CHAR szProvider[260] = { MS_STRONG_PROV };
// Every Enhanced Usage Extension has a
// corresponding number to it.  Just add
// the number to set the appropriate
// extension:
// Server Authentication   1
// Client Authentication   2
// Code Signing            4
// Email Protection        8
// Time Stamping           16
ENHKEYUSAGE g_EnhKeyUsage =
{
   KEY_USAGE_SIZE,
   {
      szOID_PKIX_KP_SERVER_AUTH,
      szOID_PKIX_KP_CLIENT_AUTH,
      szOID_PKIX_KP_CODE_SIGNING,
      szOID_PKIX_KP_EMAIL_PROTECTION,
      szOID_PKIX_KP_TIMESTAMP_SIGNING
   },
   { 1, 2, 4, 8, 16}
};


int CACreateCertificate(
		LPSTR szCertFile,	//根證書導出到該證書文件
        LPSTR szKeyFile,	//簽名公私鑰保存文件
		LPSTR szXCHGKeyFile,	//交換公私鑰保存文件
		LPSTR szXCHGPubFile,	//交換公鑰保存文件
        LPSTR szPassword)	//密鑰文件口令
{
   char szXCHGExpPubKey[2000];
   int nRtn;
   DWORD dwError=0; 
   BOOL bReturn = FALSE;
   BOOL bResult;
   LPBYTE pbNameBlob = NULL;
//   RPC_STATUS Status;
   HCRYPTPROV hCryptProv = 0;
   HCRYPTPROV hIssuerProv = 0;
   HCRYPTKEY hPubKey = 0;
   HCRYPTKEY hXCHGPubKey = 0;
   HCRYPTKEY hSessionKey = 0;
   HCRYPTHASH hHash = 0;
   HCERTSTORE hStore = 0;
   HCERTSTORE hStoreRoot = 0;
   HANDLE hCertFile = INVALID_HANDLE_VALUE;
   HANDLE hKeyFile = INVALID_HANDLE_VALUE;
   PCRYPT_DATA_BLOB KeyId = NULL;
   PCERT_PUBLIC_KEY_INFO PublicKeyInfo = NULL;
   PCCERT_CONTEXT pIssuerCert = NULL;
   PCCERT_CONTEXT pCertContext = NULL;
   PCCERT_CONTEXT pTmpCertContext = NULL;
   LPBYTE pbKeyIdentifier = NULL;
   LPBYTE SubjectKeyIdentifier = NULL;
   LPBYTE pbKeyUsage = NULL;
   LPBYTE pbEnhKeyUsage = NULL;
   LPBYTE pbBasicConstraints = NULL;
   LPBYTE pbAuthorityKeyId = NULL;
   LPBYTE bpEncodedCert = NULL;
   LPBYTE pbExportedKey = NULL;
   LPBYTE pbXCHGExportedKey = NULL;
   LPBYTE pbXCHGExportedPUBLICKey = NULL;
   CERT_ENHKEY_USAGE CertEnhKeyUsage = { 0, NULL };
//   BYTE SerialNumber[8];
   CERT_BASIC_CONSTRAINTS2_INFO BasicConstraints;
   CERT_AUTHORITY_KEY_ID_INFO AuthorityKeyId;
   BYTE ByteData;
   CRYPT_BIT_BLOB KeyUsage;
   CERT_EXTENSION CertExtension[5];
   CRYPT_DATA_BLOB CertKeyIdentifier;
   CERT_NAME_BLOB IssuerName;
   HANDLE hHeap = GetProcessHeap();
   CERT_INFO CertInfo;
   DWORD dwSize, m, q;
//   DWORD dwAcquireFlags, dwIssuerKeyType;
//   DWORD dwIssuerFlags, dwSubjectFlags;
   DWORD dwSubjectFlags =CERT_SYSTEM_STORE_LOCAL_MACHINE;
   FILETIME ftTime;
   SYSTEMTIME stTime;
   DWORD dwProviderType = PROV_RSA_FULL;
   BOOL bAddAuthorityExtension = FALSE;
   LPBYTE pbCertSerialNum = NULL;
   

	while(1)
	{
		if(!CryptAcquireContext(&hCryptProv,                // 返回CSP句柄
								szContainer,                    // 密碼容器名
								szProvider,                      // NULL時使用默認CSP名(微軟RSA Base Provider)
								PROV_RSA_FULL,             // CSP類型
								0))                        // Flag values
		{ 
			if(!CryptAcquireContext(&hCryptProv, 
								  szContainer, 
								  szProvider, 
								  PROV_RSA_FULL, 
								  CRYPT_NEWKEYSET)) //創建以szContainer為名的密鑰容器
			{
				dwError = GetLastError();
				break;
			}
		}

		// Generate AT_SIGNATURE Private/Public key pair
		bResult = CryptGenKey(hCryptProv, AT_SIGNATURE, CRYPT_EXPORTABLE, &hPubKey);
		if (!bResult)
		{
			dwError = GetLastError();
			break;
		}
	  

	  	// Generate AT_KEYEXCHANGE Private/Public key pair
		bResult = CryptGenKey(hCryptProv, AT_KEYEXCHANGE, CRYPT_EXPORTABLE, &hXCHGPubKey);
		if (!bResult)
		{
			dwError = GetLastError();
			break;
		}


		// Find Enhanced Key Usage extensions count
      for (m = 0; m < g_EnhKeyUsage.dwCount; m++)
      {
        if ((g_EnhKeyUsage.dwValue[m] & 0xffff) == g_EnhKeyUsage.dwValue[m])
        {
          CertEnhKeyUsage.cUsageIdentifier++;
        }
      }

      // If extensions exist continue
      if (CertEnhKeyUsage.cUsageIdentifier != 0)
      {
         // Allocate memory for Enhanced Key Usage array
         CertEnhKeyUsage.rgpszUsageIdentifier =
             (LPSTR *)HeapAlloc(hHeap, 0, CertEnhKeyUsage.cUsageIdentifier * sizeof(LPSTR));
         if (!CertEnhKeyUsage.rgpszUsageIdentifier)
         {
           printf("Unable to allocate memory for Enhanced Usage array\n");
           break;
         }

         // Initialize Enhanced Key Usage array to NULL
         for (m = 0; m < CertEnhKeyUsage.cUsageIdentifier; m++)
         {
           CertEnhKeyUsage.rgpszUsageIdentifier[m] = NULL;
         }

         // Add proper extension OID to array
         q = 0;
         for (m = 0; m < g_EnhKeyUsage.dwCount; m++)
         {
           if ((g_EnhKeyUsage.dwValue[m] & 0xffff) == g_EnhKeyUsage.dwValue[m])
           {
             CertEnhKeyUsage.rgpszUsageIdentifier[q++] = g_EnhKeyUsage.szUsage[m];
           }
         }
      }


		// Zero CERT_INFO structure
		ZeroMemory(&CertInfo, sizeof(CertInfo));

		// Set Version of Certificate
		CertInfo.dwVersion = CERT_V3;

		// Set Serial Number of Certificate
		DWORD	serNum = 1;
		bResult = XFCryptEncodeObject(hHeap,MYCODING_TYPE,X509_INTEGER,(LPVOID)&serNum,&pbCertSerialNum,&dwSize);
		if(!bResult)
		{
			dwError = -3101;
			break;
		}
		// Set Serial Number of Certificate
		CertInfo.SerialNumber.cbData = dwSize;
		CertInfo.SerialNumber.pbData = pbCertSerialNum;

		// Set Signature Algorithm of Certificate
		CertInfo.SignatureAlgorithm.pszObjId = szOID_RSA_SHA1RSA;//szOID_RSA_MD5;//szOID_RSA_SHA1RSA;//szOID_RSA_SHA1RSA;//szOID_RSA;
		CertInfo.SignatureAlgorithm.Parameters.cbData = 0;
		CertInfo.SignatureAlgorithm.Parameters.pbData = NULL;

		// set NotBefore date
		GetSystemTime(&stTime);
		SystemTimeToFileTime(&stTime, &ftTime);
		CertInfo.NotBefore = ftTime;

		// Set After Date
		stTime.wYear += 10;
		SystemTimeToFileTime(&stTime, &ftTime);
		CertInfo.NotAfter = ftTime;

		// Get Public Key Info
		nRtn = GetPublicKey(hCryptProv,hHeap,&PublicKeyInfo);
		if(nRtn < 0)
		{
			dwError = nRtn;
			break;
		}
		// Set Public Key info of Certificate
		CertInfo.SubjectPublicKeyInfo = *PublicKeyInfo;

		// Get Hash of Public Key Info
		nRtn = GetPubKeyHash(hCryptProv,hHeap,PublicKeyInfo,&dwSize,&pbKeyIdentifier);
		if(nRtn < 0)
		{
			dwError = nRtn;
			break;
		}
		// We will use this to set the Key Identifier extension
		CertKeyIdentifier.cbData = dwSize;
		CertKeyIdentifier.pbData = pbKeyIdentifier;  

		// Convert X509 Name to Name Blob
		bResult = XFCertStrToName(hHeap,MYCODING_TYPE,ISSUERX509NAME,CERT_X500_NAME_STR,NULL,(LPBYTE *)&pbNameBlob,&dwSize,NULL);
		if(!bResult)
		{
			dwError = -3100;
			break;
		}
		IssuerName.cbData = dwSize;
		IssuerName.pbData = pbNameBlob;
		// Set Subject of Certificate
		CertInfo.Subject = IssuerName;
		// Set Issuer of Certificate
		CertInfo.Issuer = IssuerName;


		// Get Subject Key Identifier Extension
		bResult = XFCryptEncodeObject(hHeap,MYCODING_TYPE,szOID_SUBJECT_KEY_IDENTIFIER,(LPVOID)&CertKeyIdentifier,&SubjectKeyIdentifier,&dwSize);
		if(!bResult)
		{
			dwError = -3102;
			break;
		}

		// Set Subject Key Identifier
      CertExtension[CertInfo.cExtension].pszObjId = szOID_SUBJECT_KEY_IDENTIFIER;
      CertExtension[CertInfo.cExtension].fCritical = FALSE;
      CertExtension[CertInfo.cExtension].Value.cbData = dwSize;
      CertExtension[CertInfo.cExtension].Value.pbData = SubjectKeyIdentifier;

      // Increase extension count
      CertInfo.cExtension++;


	  // Set Key Usage according to Public Key Type
      ZeroMemory(&KeyUsage, sizeof(KeyUsage));
      KeyUsage.cbData = 1;
      KeyUsage.pbData = &ByteData;

	  ByteData = CERT_DIGITAL_SIGNATURE_KEY_USAGE|
                    CERT_NON_REPUDIATION_KEY_USAGE|
                    CERT_KEY_CERT_SIGN_KEY_USAGE |
                    CERT_CRL_SIGN_KEY_USAGE;
	   // Get Key Usage Extension blob
	  bResult = XFCryptEncodeObject(hHeap,MYCODING_TYPE,
                                  X509_KEY_USAGE,
                                  (LPVOID)&KeyUsage,
                                  &pbKeyUsage, &dwSize);
	  if(!bResult)
	  {
		dwError = -3103;
		break;
	  }

	  // Set Key Usage extension
      CertExtension[CertInfo.cExtension].pszObjId = szOID_KEY_USAGE;
      CertExtension[CertInfo.cExtension].fCritical = FALSE;
      CertExtension[CertInfo.cExtension].Value.cbData = dwSize;
      CertExtension[CertInfo.cExtension].Value.pbData = pbKeyUsage;

      // Increase extension count
      CertInfo.cExtension++;


	  if (CertEnhKeyUsage.cUsageIdentifier != 0)
      {
         // Get Enhanced Key Usage Extension blob
         bResult = XFCryptEncodeObject(hHeap,MYCODING_TYPE,
                                     X509_ENHANCED_KEY_USAGE,
                                     (LPVOID)&CertEnhKeyUsage,
                                     &pbEnhKeyUsage, &dwSize);
         if(!bResult)
			{
			dwError = -3104;
			break;
			}

         // Set Enhanced Key Usage extension
         CertExtension[CertInfo.cExtension].pszObjId = szOID_ENHANCED_KEY_USAGE;
         CertExtension[CertInfo.cExtension].fCritical = FALSE;
         CertExtension[CertInfo.cExtension].Value.cbData = dwSize;
         CertExtension[CertInfo.cExtension].Value.pbData = pbEnhKeyUsage;

         // Increase extension count
         CertInfo.cExtension++;
      }

	  // Zero Basic Constraints structure
      ZeroMemory(&BasicConstraints, sizeof(BasicConstraints));

      // Self-signed is always a CA
         BasicConstraints.fCA = TRUE;
         BasicConstraints.fPathLenConstraint = TRUE;
         BasicConstraints.dwPathLenConstraint = 1;

      // Get Basic Constraints Extension blob
      bResult = XFCryptEncodeObject(hHeap,MYCODING_TYPE,
                                  X509_BASIC_CONSTRAINTS2,
                                  (LPVOID)&BasicConstraints,
                                  &pbBasicConstraints, &dwSize);
     if(!bResult)
	{
			dwError = -3105;
			break;
	}

      // Set Basic Constraints extension
      CertExtension[CertInfo.cExtension].pszObjId = szOID_BASIC_CONSTRAINTS2;
      CertExtension[CertInfo.cExtension].fCritical = FALSE;
      CertExtension[CertInfo.cExtension].Value.cbData = dwSize;
      CertExtension[CertInfo.cExtension].Value.pbData = pbBasicConstraints;

      // Increase extension count
      CertInfo.cExtension++;


	  AuthorityKeyId.KeyId = CertKeyIdentifier;
      AuthorityKeyId.CertIssuer = CertInfo.Issuer;
      AuthorityKeyId.CertSerialNumber = CertInfo.SerialNumber;
      bAddAuthorityExtension = TRUE;


         // Get Authority Key Id blob
         bResult = XFCryptEncodeObject(hHeap,MYCODING_TYPE,
                                     X509_AUTHORITY_KEY_ID,
                                     (LPVOID)&AuthorityKeyId,
                                     &pbAuthorityKeyId, &dwSize);
         if(!bResult)
			{
			dwError = -3106;
			break;
			}

         // Set Authority Key Id extension
         CertExtension[CertInfo.cExtension].pszObjId = szOID_AUTHORITY_KEY_IDENTIFIER;
         CertExtension[CertInfo.cExtension].fCritical = FALSE;
         CertExtension[CertInfo.cExtension].Value.cbData = dwSize;
         CertExtension[CertInfo.cExtension].Value.pbData = pbAuthorityKeyId;

         // Increase extension count
         CertInfo.cExtension++;



		 CertInfo.rgExtension = CertExtension;


         // Get Encoded Certificate Size
         bResult = CryptSignAndEncodeCertificate(hCryptProv, AT_SIGNATURE,
                                                 MYCODING_TYPE, X509_CERT_TO_BE_SIGNED,
                                                 (LPVOID)&CertInfo,
                                                 &(CertInfo.SignatureAlgorithm),
                                                 NULL, NULL, &dwSize);
         if (!bResult)
         {
            dwError = GetLastError();
            break;
         }

         // Allocate memory for encoded certificate
         bpEncodedCert = (LPBYTE)HeapAlloc(hHeap, 0, dwSize);
         if (!bpEncodedCert)
         {
            dwError = GetLastError();
            break;
         }

         // Sign and Encode certificate
         bResult = CryptSignAndEncodeCertificate(hCryptProv, AT_SIGNATURE,
                                                 MYCODING_TYPE, X509_CERT_TO_BE_SIGNED,
                                                 (LPVOID)&CertInfo,
                                                 &(CertInfo.SignatureAlgorithm),
                                                 NULL, bpEncodedCert, &dwSize);
         if (!bResult)
         {
            dwError = GetLastError();
            break;
         }

		 // Write encoded Certificate to file
		 nRtn = WriteToFile((char *)bpEncodedCert, dwSize,szCertFile);
		 if (nRtn < 0)
         {
            dwError = -3115;
            break;
         }
			

		 WCHAR szwStore[20];
          WCHAR szwContainer[160];
          WCHAR szwProvider[260];
          CRYPT_KEY_PROV_INFO CryptKeyProvInfo;

          // Convert Store string to unicode
          nRtn = MultiByteToWideChar(0, 0, szIssuerStore, -1, szwStore, 20);
          if (nRtn == 0)
          {
              dwError = GetLastError();
              break;
          }

          nRtn = MultiByteToWideChar(0, 0, szProvider, -1, szwProvider, 260);
          if (nRtn == 0)
          {
             dwError = GetLastError();
              break;
          }


		  // Delete Certificate store
		  hStore = CertOpenStore(CERT_STORE_PROV_SYSTEM,
                                 MYCODING_TYPE,
                                 CERT_STORE_DELETE_FLAG, dwSubjectFlags, (LPVOID)szwStore);
		  
          // Open Certificate store
          hStore = CertOpenStore(CERT_STORE_PROV_SYSTEM,
                                 MYCODING_TYPE,
                                 0, dwSubjectFlags, (LPVOID)szwStore);
          if (!hStore)
          {
              dwError = GetLastError();
              break;
          }

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲444eee在线观看| 91精品国产综合久久久久久久久久| 午夜欧美视频在线观看| 亚洲国产精品人人做人人爽| 亚洲欧美在线视频| 欧美激情一区二区三区蜜桃视频| 中文av一区二区| 国产日产精品1区| 久久亚洲精精品中文字幕早川悠里| 欧美性猛交xxxx黑人交| 56国语精品自产拍在线观看| 7777精品伊人久久久大香线蕉经典版下载 | 国产伦精品一区二区三区在线观看| 一区二区三区高清不卡| 一级精品视频在线观看宜春院 | 欧美精品tushy高清| 欧美剧情电影在线观看完整版免费励志电影| 欧美在线综合视频| 欧美一区二区精品| 国产精品电影一区二区三区| 亚洲一区在线观看视频| 午夜国产精品一区| 成人网在线播放| 粉嫩蜜臀av国产精品网站| 91黄色激情网站| 欧美精品一区二区三区在线播放 | 成人一区二区三区中文字幕| 狠狠久久亚洲欧美| 国产高清不卡一区二区| 国产69精品久久久久777| 99精品1区2区| 91精品国产美女浴室洗澡无遮挡| 欧美成va人片在线观看| 国产精品久久久久影视| 蜜桃91丨九色丨蝌蚪91桃色| 国内精品自线一区二区三区视频| 国产欧美一区二区精品久导航 | 婷婷成人综合网| 国产在线视频一区二区| 美美哒免费高清在线观看视频一区二区 | 日韩欧美国产三级| 国产精品久久久久天堂| 亚洲777理论| 成人午夜精品在线| 6080国产精品一区二区| 国产精品拍天天在线| 午夜欧美在线一二页| 国产成人免费av在线| 欧美一级生活片| 亚洲色图欧美偷拍| 国产xxx精品视频大全| 欧美日韩黄色一区二区| 国产精品精品国产色婷婷| 蜜乳av一区二区| 欧美日韩在线综合| 综合激情成人伊人| 国产69精品一区二区亚洲孕妇| 欧美日韩不卡在线| 亚洲精品伦理在线| 丰满白嫩尤物一区二区| 精品免费国产二区三区| 秋霞午夜鲁丝一区二区老狼| 欧美手机在线视频| 亚洲精品网站在线观看| zzijzzij亚洲日本少妇熟睡| 久久久久久久久伊人| 免费一级欧美片在线观看| 欧美视频第二页| 亚洲高清免费观看| 色av成人天堂桃色av| 一区二区欧美国产| 在线区一区二视频| 亚洲欧美日韩在线| 一本大道久久精品懂色aⅴ| 国产女人aaa级久久久级| 国产精品99久久久久久久女警 | 日韩精品一区二| 日日夜夜精品视频免费| 欧美精品第1页| 日本欧美一区二区| 91麻豆精品91久久久久同性| 午夜电影网亚洲视频| 欧美色网站导航| 午夜精品一区二区三区免费视频| 欧美亚洲免费在线一区| 亚洲另类在线一区| 欧美图片一区二区三区| 一区二区三区毛片| 91麻豆精品国产自产在线 | 欧美三级中文字幕在线观看| 亚洲一区二区三区四区在线观看| 在线视频一区二区三| 午夜精品久久久久久久久久久| 欧美视频一区在线| 免费成人你懂的| 国产欧美精品区一区二区三区| 波多野结衣中文字幕一区二区三区| 国产欧美一区二区三区鸳鸯浴 | 在线电影欧美成精品| 麻豆精品新av中文字幕| 中文字幕乱码一区二区免费| 色天天综合久久久久综合片| 日韩极品在线观看| 亚洲综合男人的天堂| 欧美日韩精品一区二区三区蜜桃| 秋霞午夜av一区二区三区| 久久精子c满五个校花| 日本精品视频一区二区| 日本亚洲三级在线| 中文字幕在线一区| 欧美一区二区三区在线| 成人国产一区二区三区精品| 午夜电影久久久| 国产精品污网站| 欧美情侣在线播放| 成人精品国产福利| 日韩综合小视频| 国产精品免费视频网站| 日韩欧美二区三区| 91浏览器在线视频| 久久av中文字幕片| 午夜激情久久久| 亚洲视频在线一区二区| 日韩一级成人av| 欧美伊人久久大香线蕉综合69 | 午夜视频在线观看一区二区| 欧美激情中文字幕一区二区| 69堂国产成人免费视频| 91一区在线观看| 国产丶欧美丶日本不卡视频| 日韩精彩视频在线观看| 亚洲人成影院在线观看| 国产亚洲人成网站| 欧美一区二区三区系列电影| 色婷婷激情综合| 成人福利视频网站| 久久国产人妖系列| 蜜桃视频一区二区| 亚洲一区二区三区四区在线| 日韩一区有码在线| 久久日一线二线三线suv| 欧美一区二区在线免费观看| 在线视频欧美区| 色综合中文综合网| 日韩成人精品在线观看| 国产精品乱人伦| 中文字幕成人av| 国产性色一区二区| 日韩一级成人av| 国产精品二区一区二区aⅴ污介绍| 精品99一区二区三区| 欧美精品三级日韩久久| 91麻豆精品久久久久蜜臀| 欧美乱熟臀69xxxxxx| 欧美美女直播网站| 欧美日韩免费观看一区二区三区| 欧美综合一区二区| 欧美日韩中字一区| 欧美日韩久久久一区| 欧美日韩国产免费一区二区| 欧美日韩www| 91精品国产一区二区| 日韩视频一区二区三区在线播放 | 成人h精品动漫一区二区三区| 国产中文字幕精品| 国产suv精品一区二区883| 成人h动漫精品| 欧洲亚洲精品在线| 91精品国产黑色紧身裤美女| 欧美一区二区视频在线观看2022| 日韩视频免费观看高清完整版| 4hu四虎永久在线影院成人| 欧美一级生活片| 久久久久青草大香线综合精品| 国产精品青草久久| 亚洲黄网站在线观看| 亚洲高清免费观看高清完整版在线观看| 亚洲在线视频免费观看| 美女看a上一区| 懂色av一区二区三区免费观看| 99久久国产综合色|国产精品| 91精品办公室少妇高潮对白| 欧美一区二区三区四区五区| 久久蜜桃av一区精品变态类天堂| 中文在线一区二区| 亚洲国产你懂的| 美女脱光内衣内裤视频久久网站 | 日本中文字幕一区| 成人自拍视频在线| 欧美日韩国产成人在线免费| 2020国产精品| 一区二区三区不卡视频| 一区二区三区在线影院| 精品在线观看视频| 91九色02白丝porn| 国产午夜精品美女毛片视频| 亚洲线精品一区二区三区八戒| 国产成人综合网| 91丝袜美腿高跟国产极品老师 | 在线视频一区二区三|