亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? lcp.c

?? vxwork源代碼
?? C
?? 第 1 頁 / 共 3 頁
字號:
    ACKCISHORT(CI_MRU, go->neg_mru, go->mru);    ACKCILONG(CI_ASYNCMAP, go->neg_asyncmap, go->asyncmap);    ACKCICHAP(CI_AUTHTYPE, go->neg_chap, CHAP, go->chap_mdtype);    ACKCISHORT(CI_AUTHTYPE, !go->neg_chap && go->neg_upap, UPAP);    ACKCILQR(CI_QUALITY, go->neg_lqr, go->lqr_period);    ACKCILONG(CI_MAGICNUMBER, go->neg_magicnumber, go->magicnumber);    ACKCIVOID(CI_PCOMPRESSION, go->neg_pcompression);    ACKCIVOID(CI_ACCOMPRESSION, go->neg_accompression);    /*     * If there are any remaining CIs, then this packet is bad.     */    if (len != 0)	goto bad;    return (1);bad:    LCPDEBUG((LOG_WARNING, "lcp_acki: received bad Ack!"));    return (0);}/* * lcp_nakci - Peer has sent a NAK for some of our CIs. * This should not modify any state if the Nak is bad * or if LCP is in the OPENED state. * * Returns: *	0 - Nak was bad. *	1 - Nak was good. */static intlcp_nakci(f, p, len)    fsm *f;    u_char *p;    int len;{    lcp_options *go = &ppp_if[f->unit]->lcp_gotoptions;    lcp_options *wo = &ppp_if[f->unit]->lcp_wantoptions;    u_char cilen, citype, cichar, *next;    u_short cishort = 0;    u_long cilong;    lcp_options no;		/* options we've seen Naks for */    lcp_options try;		/* options to request next time */    int looped_back = 0;    BZERO((char *)&no, sizeof(no));    try = *go;    /*     * Any Nak'd CIs must be in exactly the same order that we sent.     * Check packet length and CI length at each step.     * If we find any deviations, then this packet is bad.     */#define NAKCIVOID(opt, neg, code) \    if (go->neg && \	len >= CILEN_VOID && \	p[1] == CILEN_VOID && \	p[0] == opt) { \	len -= CILEN_VOID; \	INCPTR(CILEN_VOID, p); \	no.neg = 1; \	code \    }#define NAKCICHAP(opt, neg, code) \    if (go->neg && \	len >= CILEN_CHAP && \	p[1] == CILEN_CHAP && \	p[0] == opt) { \	len -= CILEN_CHAP; \	INCPTR(2, p); \	GETSHORT(cishort, p); \	GETCHAR(cichar, p); \	no.neg = 1; \	code \    }#define NAKCISHORT(opt, neg, code) \    if (go->neg && \	len >= CILEN_SHORT && \	p[1] == CILEN_SHORT && \	p[0] == opt) { \	len -= CILEN_SHORT; \	INCPTR(2, p); \	GETSHORT(cishort, p); \	no.neg = 1; \	code \    }#define NAKCILONG(opt, neg, code) \    if (go->neg && \	len >= CILEN_LONG && \	p[1] == CILEN_LONG && \	p[0] == opt) { \	len -= CILEN_LONG; \	INCPTR(2, p); \	GETLONG(cilong, p); \	no.neg = 1; \	code \    }#define NAKCILQR(opt, neg, code) \    if (go->neg && \	len >= CILEN_LQR && \	p[1] == CILEN_LQR && \	p[0] == opt) { \	len -= CILEN_LQR; \	INCPTR(2, p); \	GETSHORT(cishort, p); \	GETLONG(cilong, p); \	no.neg = 1; \	code \    }    /*     * We don't care if they want to send us smaller packets than     * we want.  Therefore, accept any MRU less than what we asked for,     * but then ignore the new value when setting the MRU in the kernel.     * If they send us a bigger MRU than what we asked, accept it, up to     * the limit of the default MRU we'd get if we didn't negotiate.     */    NAKCISHORT(CI_MRU, neg_mru,	       if (cishort <= wo->mru || cishort < DEFMRU)		   try.mru = cishort;	       );    /*     * Add any characters they want to our (receive-side) asyncmap.     */    NAKCILONG(CI_ASYNCMAP, neg_asyncmap,	      try.asyncmap = go->asyncmap | cilong;	      );    /*     * If they can't cope with our CHAP hash algorithm, we'll have     * to stop asking for CHAP.  We haven't got any other algorithm.     */    NAKCICHAP(CI_AUTHTYPE, neg_chap,	      try.neg_chap = 0;	      );    /*     * Peer shouldn't send Nak for UPAP, protocol compression or     * address/control compression requests; they should send     * a Reject instead.  If they send a Nak, treat it as a Reject.     */    if (!go->neg_chap ){	NAKCISHORT(CI_AUTHTYPE, neg_upap,		   try.neg_upap = 0;		   );    }    /*     * If they can't cope with our link quality protocol, we'll have     * to stop asking for LQR.  We haven't got any other protocol.     * If they Nak the reporting period, take their value XXX ?     */    NAKCILQR(CI_QUALITY, neg_lqr,	      if (cishort != LQR)		  try.neg_lqr = 0;	      else	          try.lqr_period = cilong;	      );    /*     * Check for a looped-back line.     */    NAKCILONG(CI_MAGICNUMBER, neg_magicnumber,	      try.magicnumber = magic();	      ++try.numloops;	      looped_back = 1;	      );    NAKCIVOID(CI_PCOMPRESSION, neg_pcompression,	      try.neg_pcompression = 0;	      );    NAKCIVOID(CI_ACCOMPRESSION, neg_accompression,	      try.neg_accompression = 0;	      );    /*     * There may be remaining CIs, if the peer is requesting negotiation     * on an option that we didn't include in our request packet.     * If we see an option that we requested, or one we've already seen     * in this packet, then this packet is bad.     * If we wanted to respond by starting to negotiate on the requested     * option(s), we could, but we don't, because except for the     * authentication type and quality protocol, if we are not negotiating     * an option, it is because we were told not to.     * For the authentication type, the Nak from the peer means     * `let me authenticate myself with you' which is a bit pointless.     * For the quality protocol, the Nak means `ask me to send you quality     * reports', but if we didn't ask for them, we don't want them.     */    while (len > CILEN_VOID) {	GETCHAR(citype, p);	GETCHAR(cilen, p);	if( (len -= cilen) < 0 )	    goto bad;	next = p + cilen - 2;	switch (citype) {	case CI_MRU:	    if (go->neg_mru || no.neg_mru || cilen != CILEN_SHORT)		goto bad;	    break;	case CI_ASYNCMAP:	    if (go->neg_asyncmap || no.neg_asyncmap || cilen != CILEN_LONG)		goto bad;	    break;	case CI_AUTHTYPE:	    if (go->neg_chap || no.neg_chap || go->neg_upap || no.neg_upap)		goto bad;	    break;	case CI_MAGICNUMBER:	    if (go->neg_magicnumber || no.neg_magicnumber ||		cilen != CILEN_LONG)		goto bad;	    break;	case CI_PCOMPRESSION:	    if (go->neg_pcompression || no.neg_pcompression		|| cilen != CILEN_VOID)		goto bad;	    break;	case CI_ACCOMPRESSION:	    if (go->neg_accompression || no.neg_accompression		|| cilen != CILEN_VOID)		goto bad;	    break;	case CI_QUALITY:	    if (go->neg_lqr || no.neg_lqr || cilen != CILEN_LQR)		goto bad;	    break;	default:	    goto bad;	}	p = next;    }    /* If there is still anything left, this packet is bad. */    if (len != 0)	goto bad;    /*     * OK, the Nak is good.  Now we can update state.     */    if (f->state != OPENED) {	*go = try;	if (looped_back && try.numloops % lcp_warnloops == 0)	    LCPDEBUG((LOG_INFO, "The line appears to be looped back."));    }    return 1;bad:    LCPDEBUG((LOG_WARNING, "lcp_nakci: received bad Nak!"));    return 0;}/* * lcp_rejci - Peer has Rejected some of our CIs. * This should not modify any state if the Reject is bad * or if LCP is in the OPENED state. * * Returns: *	0 - Reject was bad. *	1 - Reject was good. */static intlcp_rejci(f, p, len)    fsm *f;    u_char *p;    int len;{    lcp_options *go = &ppp_if[f->unit]->lcp_gotoptions;    u_char cichar = 0;    u_short cishort;    u_long cilong;#ifdef	DEBUGLCP    u_char *start = p;    int plen = len;#endif	/* DEBUGLCP */    lcp_options try;		/* options to request next time */    try = *go;    /*     * Any Rejected CIs must be in exactly the same order that we sent.     * Check packet length and CI length at each step.     * If we find any deviations, then this packet is bad.     */#define REJCIVOID(opt, neg) \    if (go->neg && \	len >= CILEN_VOID && \	p[1] == CILEN_VOID && \	p[0] == opt) { \	len -= CILEN_VOID; \	INCPTR(CILEN_VOID, p); \	try.neg = 0; \	LCPDEBUG((LOG_INFO, "lcp_rejci rejected void opt %d", opt)); \    }#define REJCISHORT(opt, neg, val) \    if (go->neg && \	len >= CILEN_SHORT && \	p[1] == CILEN_SHORT && \	p[0] == opt) { \	len -= CILEN_SHORT; \	INCPTR(2, p); \	GETSHORT(cishort, p); \	/* Check rejected value. */ \	if (cishort != (u_short)val) \	    goto bad; \	try.neg = 0; \	LCPDEBUG((LOG_INFO,"lcp_rejci rejected short opt %d", opt)); \    }#define REJCICHAP(opt, neg, val, digest) \    if (go->neg && \	len >= CILEN_CHAP && \	p[1] == CILEN_CHAP && \	p[0] == opt) { \	len -= CILEN_CHAP; \	INCPTR(2, p); \	GETSHORT(cishort, p); \	GETCHAR(cichar, p); \	/* Check rejected value. */ \	if (cishort != (u_short)val || cichar != (u_char)digest) \	    goto bad; \	try.neg = 0; \	LCPDEBUG((LOG_INFO,"lcp_rejci rejected chap opt %d", opt)); \    }#define REJCILONG(opt, neg, val) \    if (go->neg && \	len >= CILEN_LONG && \	p[1] == CILEN_LONG && \	p[0] == opt) { \	len -= CILEN_LONG; \	INCPTR(2, p); \	GETLONG(cilong, p); \	/* Check rejected value. */ \	if (cilong != (u_long)val) \	    goto bad; \	try.neg = 0; \	LCPDEBUG((LOG_INFO,"lcp_rejci rejected long opt %d", opt)); \    }#define REJCILQR(opt, neg, val) \    if (go->neg && \	len >= CILEN_LQR && \	p[1] == CILEN_LQR && \	p[0] == opt) { \	len -= CILEN_LQR; \	INCPTR(2, p); \	GETSHORT(cishort, p); \	GETLONG(cilong, p); \	/* Check rejected value. */ \	if (cishort != LQR || cilong != val) \	    goto bad; \	try.neg = 0; \	LCPDEBUG((LOG_INFO,"lcp_rejci rejected LQR opt %d", opt)); \    }    REJCISHORT(CI_MRU, neg_mru, go->mru);    REJCILONG(CI_ASYNCMAP, neg_asyncmap, go->asyncmap);    REJCICHAP(CI_AUTHTYPE, neg_chap, CHAP, go->chap_mdtype);    if (!go->neg_chap) {	REJCISHORT(CI_AUTHTYPE, neg_upap, UPAP);    }    REJCILQR(CI_QUALITY, neg_lqr, go->lqr_period);    REJCILONG(CI_MAGICNUMBER, neg_magicnumber, go->magicnumber);    REJCIVOID(CI_PCOMPRESSION, neg_pcompression);    REJCIVOID(CI_ACCOMPRESSION, neg_accompression);    /*     * If there are any remaining CIs, then this packet is bad.     */    if (len != 0)	goto bad;    /*     * Now we can update state.     */    if (f->state != OPENED)	*go = try;    return 1;bad:    LCPDEBUG((LOG_WARNING, "lcp_rejci: received bad Reject!"));    LCPDEBUG((LOG_WARNING, "lcp_rejci: plen %d len %d off %d",              plen, len, p - start));    return 0;}/* * lcp_reqci - Check the peer's requested CIs and send appropriate response. * * Returns: CONFACK, CONFNAK or CONFREJ and input packet modified * appropriately.  If reject_if_disagree is non-zero, doesn't return * CONFNAK; returns CONFREJ if it can't return CONFACK. */static intlcp_reqci(f, inp, lenp, reject_if_disagree)    fsm *f;    u_char *inp;                /* Requested CIs */    int *lenp;                  /* Length of requested CIs */    int reject_if_disagree;{    lcp_options *go = &ppp_if[f->unit]->lcp_gotoptions;    lcp_options *ho = &ppp_if[f->unit]->lcp_hisoptions;    lcp_options *ao = &ppp_if[f->unit]->lcp_allowoptions;    u_char *cip, *next;		/* Pointer to current and next CIs */    u_char cilen, citype = 0, cichar;/* Parsed len, type, char value */    u_short cishort;		/* Parsed short value */    u_long cilong;		/* Parse long value */    int rc = CONFACK;		/* Final packet return code */    int orc;			/* Individual option return code */    u_char *p;			/* Pointer to next char to parse */    u_char *rejp;		/* Pointer to next char in reject frame */    u_char *nakp;		/* Pointer to next char in Nak frame */    int l = *lenp;		/* Length left */    /*     * Reset all his options.     */    BZERO((char *)ho, sizeof(*ho));    /*     * Process all his options.     */    next = inp;    nakp = nak_buffer;    rejp = inp;    while (l) {	orc = CONFACK;			/* Assume success */	cip = p = next;			/* Remember begining of CI */	if (l < 2 ||			/* Not enough data for CI header or */	    p[1] < 2 ||			/*  CI length too small or */	    p[1] > l) {			/*  CI length too big? */	    LCPDEBUG((LOG_WARNING, "lcp_reqci: bad CI length!"));	    orc = CONFREJ;		/* Reject bad CI */	    cilen = l;			/* Reject till end of packet */	    l = 0;			/* Don't loop again */	    goto endswitch;	}	GETCHAR(citype, p);		/* Parse CI type */	GETCHAR(cilen, p);		/* Parse CI length */	l -= cilen;			/* Adjust remaining length */	next += cilen;			/* Step to next CI */	switch (citype) {		/* Check CI type */	case CI_MRU:	    LCPDEBUG((LOG_INFO, "lcp_reqci: rcvd MRU"));	    if (!ao->neg_mru ||		/* Allow option? */		cilen != CILEN_SHORT) {	/* Check CI length */		orc = CONFREJ;		/* Reject CI */		break;	    }	    GETSHORT(cishort, p);	/* Parse MRU */	    LCPDEBUG((LOG_INFO, "(%d)", cishort));	    /*	     * He must be able to receive at least our minimum.	     * No need to check a maximum.  If he sends a large number,	     * we'll just ignore it.	     */	    if (cishort < MINMRU) {		orc = CONFNAK;		/* Nak CI */		if( !reject_if_disagree ){		    DECPTR(sizeof (short), p);	/* Backup */		    PUTSHORT(MINMRU, p);	/* Give him a hint */		}		break;	    }	    ho->neg_mru = 1;		/* Remember he sent MRU */	    ho->mru = cishort;		/* And remember value */	    break;	case CI_ASYNCMAP:	    LCPDEBUG((LOG_INFO, "lcp_reqci: rcvd ASYNCMAP"));	    if (!ao->neg_asyncmap ||		cilen != CILEN_LONG) {		orc = CONFREJ;		break;	    }	    GETLONG(cilong, p);	    LCPDEBUG((LOG_INFO, "(%lx)", cilong));	    /*	     * Asyncmap must have set at least the bits	     * which are set in lcp_allowoptions[unit].asyncmap.	     */	    if ((ao->asyncmap & ~cilong) != 0) {		orc = CONFNAK;		if( !reject_if_disagree ){		    DECPTR(sizeof (long), p);		    PUTLONG(ao->asyncmap | cilong, p);		}		break;	    }	    ho->neg_asyncmap = 1;	    ho->asyncmap = cilong;	    break;	case CI_AUTHTYPE:	    LCPDEBUG((LOG_INFO, "lcp_reqci: rcvd AUTHTYPE"));	    if (cilen < CILEN_SHORT ||		!(ao->neg_upap || ao->neg_chap)) {		orc = CONFREJ;		if (!ao->neg_upap && !ao->neg_chap)		    LCPDEBUG((LOG_INFO, " we're not willing to authenticate"));		else		    LCPDEBUG((LOG_INFO, " cilen is too short!"));		break;	    }	    GETSHORT(cishort, p);	    LCPDEBUG((LOG_INFO, "(%x)", cishort));	    /*	     * Authtype must be UPAP or CHAP.	     *	     * Note: if both ao->neg_upap and ao->neg_chap are set,	     * and the peer sends a Configure-Request with two	     * authenticate-protocol requests, one for CHAP and one	     * for UPAP, then we will reject the second request.	     * Whether we end up doing CHAP or UPAP depends then on	     * the ordering of the CIs in the peer's Configure-Request.	     */	    if (cishort == UPAP) {		if (ho->neg_chap ||	/* we've already accepted CHAP */		    cilen != CILEN_SHORT) {		    LCPDEBUG((LOG_WARNING,			      "lcp_reqci: rcvd AUTHTYPE PAP, rejecting..."));		    orc = CONFREJ;		    break;		}		if (!ao->neg_upap) {	/* we don't want to do PAP */		    orc = CONFNAK;	/* NAK it and suggest CHAP */		    PUTCHAR(CI_AUTHTYPE, nakp);		    PUTCHAR(CILEN_CHAP, nakp);		    PUTSHORT(CHAP, nakp);		    PUTCHAR(ao->chap_mdtype, nakp);		    break;		}		ho->neg_upap = 1;		break;	    }	    if (cishort == CHAP) {		if (ho->neg_upap ||	/* we've already accepted PAP */		    cilen != CILEN_CHAP) {		    LCPDEBUG((LOG_INFO,			      "lcp_reqci: rcvd AUTHTYPE CHAP, rejecting..."));		    orc = CONFREJ;		    break;		}		if (!ao->neg_chap) {	/* we don't want to do CHAP */		    orc = CONFNAK;	/* NAK it and suggest PAP */		    PUTCHAR(CI_AUTHTYPE, nakp);		    PUTCHAR(CILEN_SHORT, nakp);		    PUTSHORT(UPAP, nakp);		    break;		}		GETCHAR(cichar, p);	/* get digest type*/		if (cichar != (u_char)ao->chap_mdtype) {		    orc = CONFNAK;		    PUTCHAR(CI_AUTHTYPE, nakp);		    PUTCHAR(CILEN_CHAP, nakp);		    PUTSHORT(CHAP, nakp);		    PUTCHAR(ao->chap_mdtype, nakp);		    break;		}		ho->chap_mdtype = cichar; /* save md type */		ho->neg_chap = 1;		break;

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产欧美一区二区三区在线看蜜臀| 成人深夜在线观看| 亚洲老司机在线| 国产人成亚洲第一网站在线播放| 日韩美一区二区三区| 91精品国产综合久久小美女| 欧美日韩在线三级| 欧美少妇xxx| 欧美日韩国产精品成人| 欧美理论在线播放| 欧美一级一区二区| 久久综合九色综合欧美98| 精品国产乱码久久| 欧美国产精品一区二区三区| 国产偷国产偷亚洲高清人白洁| 欧美激情在线一区二区三区| 中文字幕一区二区在线播放| 一级精品视频在线观看宜春院 | 99精品1区2区| 91美女视频网站| 欧美日韩一级黄| 精品国产乱码久久久久久蜜臀| 久久理论电影网| 亚洲欧美激情视频在线观看一区二区三区 | 亚洲乱码中文字幕综合| 一区二区三区四区av| 石原莉奈一区二区三区在线观看| 美日韩一区二区三区| 国产尤物一区二区在线| av亚洲精华国产精华精| 欧美在线三级电影| 日韩精品中午字幕| 亚洲欧美日韩精品久久久久| 视频一区视频二区在线观看| 精品一区二区日韩| 91丨九色丨蝌蚪丨老版| 91精品国产福利在线观看| 国产欧美日韩三区| 污片在线观看一区二区| 国产高清不卡一区| 欧美美女网站色| 亚洲国产精品精华液2区45| 一区二区三区免费看视频| 激情综合网av| 欧美综合在线视频| 中文字幕一区二区三区四区不卡| 图片区小说区区亚洲影院| 99久久久久久| 久久精品一区二区三区不卡牛牛| 亚洲日本免费电影| 国产精品综合二区| 欧美老女人第四色| 亚洲欧美日韩国产一区二区三区 | 日韩和欧美一区二区| 国模少妇一区二区三区| 色伊人久久综合中文字幕| 精品久久久久久久久久久久久久久 | 欧美精品久久一区| 国产精品国产三级国产aⅴ中文| 人人狠狠综合久久亚洲| 在线观看成人小视频| 亚洲国产精华液网站w| 美女尤物国产一区| 91精品国产欧美一区二区18| 一区二区三区中文在线| heyzo一本久久综合| 国产欧美日韩在线| 国产成人精品一区二区三区网站观看| 欧美精品在线一区二区| 亚洲成人一区在线| 91黄视频在线| 一区二区三区欧美在线观看| 色婷婷av一区二区三区gif| 自拍偷拍亚洲激情| 国产91精品一区二区麻豆网站| 精品国产亚洲在线| 久久激五月天综合精品| 欧美v亚洲v综合ⅴ国产v| 日本一道高清亚洲日美韩| 制服丝袜中文字幕一区| 日韩一区精品视频| 精品久久人人做人人爽| 狠狠狠色丁香婷婷综合久久五月| 欧美一区二区精品久久911| 国产成人免费视频| 日本一区二区不卡视频| 91在线一区二区三区| 亚洲九九爱视频| 欧美性感一类影片在线播放| 亚洲综合激情小说| 欧美日韩一区二区三区不卡| 婷婷丁香激情综合| 欧美电影免费观看高清完整版在 | 欧美一区二区三区喷汁尤物| 秋霞电影网一区二区| 2024国产精品| 成人精品小蝌蚪| 亚洲色图制服丝袜| 欧美日韩中文另类| 极品销魂美女一区二区三区| 国产午夜精品一区二区三区四区| 成人精品高清在线| 首页欧美精品中文字幕| 久久综合五月天婷婷伊人| 成人av在线影院| 亚洲va欧美va天堂v国产综合| 337p亚洲精品色噜噜噜| 成人一级视频在线观看| 亚洲综合一区二区| 精品免费视频一区二区| 91网址在线看| 美女一区二区三区| 日韩一区中文字幕| 日韩手机在线导航| 99re亚洲国产精品| 日本成人在线不卡视频| 国产精品色呦呦| 欧美精品18+| 成人高清免费观看| 日本v片在线高清不卡在线观看| 国产亚洲精品资源在线26u| 欧美在线小视频| 成人黄色一级视频| 六月丁香综合在线视频| 亚洲欧美日韩在线不卡| 亚洲精品一区二区三区99| 一本色道久久综合亚洲aⅴ蜜桃| 久久精品国产99| 亚洲一区二区影院| 国产精品亲子伦对白| 精品对白一区国产伦| 欧美在线观看视频在线| 91小视频在线免费看| 国产经典欧美精品| 精品一区二区三区久久久| 日韩综合在线视频| 亚洲黄色片在线观看| 国产欧美视频一区二区三区| 亚洲精品一区二区在线观看| 日韩欧美三级在线| 7777精品伊人久久久大香线蕉的 | 欧美日韩在线不卡| 日本韩国欧美在线| 91亚洲精品久久久蜜桃网站 | 日韩一区国产二区欧美三区| 欧美性受xxxx黑人xyx| 91在线观看视频| av一区二区三区| 91原创在线视频| 成人高清在线视频| va亚洲va日韩不卡在线观看| 国产成人自拍高清视频在线免费播放| 蜜臀av性久久久久蜜臀aⅴ| 亚洲成人av一区二区三区| 亚洲一区二区在线免费观看视频| 亚洲影院久久精品| 亚洲一区二区三区激情| 亚洲bdsm女犯bdsm网站| 日韩av一二三| 久久成人免费电影| 激情五月激情综合网| 国产伦理精品不卡| 国产成人精品免费| 91在线码无精品| 欧美三片在线视频观看| 欧美一区二区大片| 精品久久久久久久久久久久包黑料| 日韩一区二区视频在线观看| 日韩一区二区免费电影| 久久蜜桃av一区精品变态类天堂 | 免费人成精品欧美精品| 久久99热这里只有精品| 国产成人在线网站| 色中色一区二区| 制服.丝袜.亚洲.中文.综合| 亚洲精品一区二区三区四区高清| 久久精品一区二区三区四区| 亚洲色图自拍偷拍美腿丝袜制服诱惑麻豆| 亚洲欧美激情视频在线观看一区二区三区| 夜夜爽夜夜爽精品视频| 轻轻草成人在线| 成人午夜激情片| 欧美区视频在线观看| xf在线a精品一区二区视频网站| 中文字幕在线观看一区| 日韩福利视频导航| thepron国产精品| 欧美一三区三区四区免费在线看 | 国产乱人伦偷精品视频不卡| av成人免费在线| 日韩精品综合一本久道在线视频| 国产精品久久久久久久午夜片| 亚洲一区二区精品视频| 国产精品夜夜嗨| 欧美日韩一级片在线观看| 欧美国产丝袜视频| 日韩精品欧美成人高清一区二区| 国产老肥熟一区二区三区| 欧美性做爰猛烈叫床潮| 国产日韩欧美电影|