亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ip_arp_udp_tcp.c

?? STM32F103VBT6連接網絡芯片ENC28J60的例子
?? C
字號:
/********************************************* * vim:sw=8:ts=8:si:et * To use the above modeline in vim you must have "set modeline" in your .vimrc * * Author: Guido Socher  * Copyright: GPL V2 * See http://www.gnu.org/licenses/gpl.html * * IP, Arp, UDP and TCP functions. * * The TCP implementation uses some size optimisations which are valid * only if all data can be sent in one single packet. This is however * not a big limitation for a microcontroller as you will anyhow use * small web-pages. The TCP stack is therefore a SDP-TCP stack (single data packet TCP). * * Chip type           : ATMEGA88 with ENC28J60 *********************************************/#include <includes.h>#define  pgm_read_byte(ptr)  ((char)*(ptr))//#define uint8_t  unsigned char//#define uint16_t unisgned intstatic uint8_t wwwport=80;static uint8_t macaddr[6];static uint8_t ipaddr[4];static int16_t info_hdr_len=0;static int16_t info_data_len=0;static uint8_t seqnum=0xa; // my initial tcp sequence number// The Ip checksum is calculated over the ip header only starting// with the header length field and a total length of 20 bytes// unitl ip.dst// You must set the IP checksum field to zero before you start// the calculation.// len for ip is 20.//// For UDP/TCP we do not make up the required pseudo header. Instead we // use the ip.src and ip.dst fields of the real packet:// The udp checksum calculation starts with the ip.src field// Ip.src=4bytes,Ip.dst=4 bytes,Udp header=8bytes + data length=16+len// In other words the len here is 8 + length over which you actually// want to calculate the checksum.// You must set the checksum field to zero before you start// the calculation.// len for udp is: 8 + 8 + data length// len for tcp is: 4+4 + 20 + option len + data length//// For more information on how this algorithm works see:// http://www.netfor2.com/checksum.html// http://www.msc.uky.edu/ken/cs471/notes/chap3.htm// The RFC has also a C code example: http://www.faqs.org/rfcs/rfc1071.htmluint16_t checksum(uint8_t *buf, uint16_t len,uint8_t type)
	{	// type 0=ip 	//      1=udp	//      2=tcp	uint32_t sum = 0;		//if(type==0){	//        // do not add anything	//}	if(type==1)
		{		sum+=IP_PROTO_UDP_V; // protocol udp		// the length here is the length of udp (data+header len)		// =length given to this function - (IP.scr+IP.dst length)		sum+=len-8; // = real tcp len		}	if(type==2)
		{		sum+=IP_PROTO_TCP_V; 		// the length here is the length of tcp (data+header len)		// =length given to this function - (IP.scr+IP.dst length)		sum+=len-8; // = real tcp len		}	// build the sum of 16bit words	while(len >1)
		{		sum += 0xFFFF & (*buf<<8|*(buf+1));		buf+=2;		len-=2;		}	// if there is a byte left then add it (padded with zero)	if (len)
		{		sum += (0xFF & *buf)<<8;		}	// now calculate the sum over the bytes in the sum	// until the result is only 16bit long	while (sum>>16)
		{		sum = (sum & 0xFFFF)+(sum >> 16);		}	// build 1's complement:	return( (uint16_t) sum ^ 0xFFFF);	}// you must call this function once before you use any of the other functions:void init_ip_arp_udp_tcp(uint8_t *mymac,uint8_t *myip,uint8_t wwwp)
	{	uint8_t i=0;	wwwport=wwwp;	while(i<4)
		{        ipaddr[i]=myip[i];        i++;		}	i=0;	while(i<6)
		{        macaddr[i]=mymac[i];        i++;		}	}uint8_t eth_type_is_arp_and_my_ip(uint8_t *buf,uint16_t len)
	{	uint8_t i=0;	//  	if (len<41)
		{	    return(0);		}	if(buf[ETH_TYPE_H_P] != ETHTYPE_ARP_H_V || buf[ETH_TYPE_L_P] != ETHTYPE_ARP_L_V)
		{	    return(0);		}	while(i<4)
		{	    if(buf[ETH_ARP_DST_IP_P+i] != ipaddr[i])
			{	        return(0);	    	}	    i++;		}	return(1);	}uint8_t eth_type_is_ip_and_my_ip(uint8_t *buf,uint16_t len)
	{	uint8_t i=0;	//eth+ip+udp header is 42	if (len<42)
		{	    return(0);		}	if(buf[ETH_TYPE_H_P]!=ETHTYPE_IP_H_V || buf[ETH_TYPE_L_P]!=ETHTYPE_IP_L_V)
		{	    return(0);		}	if (buf[IP_HEADER_LEN_VER_P]!=0x45)
		{	    // must be IP V4 and 20 byte header	    return(0);		}	while(i<4)
		{	    if(buf[IP_DST_P+i]!=ipaddr[i])
			{	        return(0);	    	}	    i++;		}	return(1);	}// make a return eth header from a received eth packetvoid make_eth(uint8_t *buf)	{	uint8_t i=0;	//	//copy the destination mac from the source and fill my mac into src	while(i<6)
		{        buf[ETH_DST_MAC +i]=buf[ETH_SRC_MAC +i];        buf[ETH_SRC_MAC +i]=macaddr[i];        i++;		}	}void fill_ip_hdr_checksum(uint8_t *buf)	{	uint16_t ck;	// clear the 2 byte checksum	buf[IP_CHECKSUM_P]=0;	buf[IP_CHECKSUM_P+1]=0;	buf[IP_FLAGS_P]=0x40; // don't fragment	buf[IP_FLAGS_P+1]=0;  // fragement offset	buf[IP_TTL_P]=64; // ttl	// calculate the checksum:	ck=checksum(&buf[IP_P], IP_HEADER_LEN,0);	buf[IP_CHECKSUM_P]=ck>>8;	buf[IP_CHECKSUM_P+1]=ck& 0xff;	}// make a return ip header from a received ip packetvoid make_ip(uint8_t *buf)	{	uint8_t i=0;	while(i<4)
		{        buf[IP_DST_P+i]=buf[IP_SRC_P+i];        buf[IP_SRC_P+i]=ipaddr[i];        i++;		}	fill_ip_hdr_checksum(buf);	}// make a return tcp header from a received tcp packet// rel_ack_num is how much we must step the seq number received from the// other side. We do not send more than 255 bytes of text (=data) in the tcp packet.// If mss=1 then mss is included in the options list//// After calling this function you can fill in the first data byte at TCP_OPTIONS_P+4// If cp_seq=0 then an initial sequence number is used (should be use in synack)// otherwise it is copied from the packet we receivedvoid make_tcphead(uint8_t *buf,uint16_t rel_ack_num,uint8_t mss,uint8_t cp_seq)	{	uint8_t i=0;	uint8_t tseq;	while(i<2)
		{	    buf[TCP_DST_PORT_H_P+i]=buf[TCP_SRC_PORT_H_P+i];	    buf[TCP_SRC_PORT_H_P+i]=0; // clear source port	    i++;		}	// set source port  (http):	buf[TCP_SRC_PORT_L_P]=wwwport;	i=4;	// sequence numbers:	// add the rel ack num to SEQACK	while(i>0)
		{	    rel_ack_num=buf[TCP_SEQ_H_P+i-1]+rel_ack_num;	    tseq=buf[TCP_SEQACK_H_P+i-1];	    buf[TCP_SEQACK_H_P+i-1]=0xff&rel_ack_num;	    if (cp_seq)
				{		        // copy the acknum sent to us into the sequence number		        buf[TCP_SEQ_H_P+i-1]=tseq;		    	}
			else
				{	            buf[TCP_SEQ_H_P+i-1]= 0; // some preset vallue	    		}	    rel_ack_num=rel_ack_num>>8;	    i--;		}	if (cp_seq==0)
		{	    // put inital seq number	    buf[TCP_SEQ_H_P+0]= 0;	    buf[TCP_SEQ_H_P+1]= 0;	    // we step only the second byte, this allows us to send packts 	    // with 255 bytes or 512 (if we step the initial seqnum by 2)	    buf[TCP_SEQ_H_P+2]= seqnum; 	    buf[TCP_SEQ_H_P+3]= 0;	    // step the inititial seq num by something we will not use	    // during this tcp session:	    seqnum+=2;		}	// zero the checksum	buf[TCP_CHECKSUM_H_P]=0;	buf[TCP_CHECKSUM_L_P]=0;		// The tcp header length is only a 4 bit field (the upper 4 bits).	// It is calculated in units of 4 bytes. 	// E.g 24 bytes: 24/4=6 => 0x60=header len field	//buf[TCP_HEADER_LEN_P]=(((TCP_HEADER_LEN_PLAIN+4)/4)) <<4; // 0x60	if (mss)
			{		    // the only option we set is MSS to 1408:		    // 1408 in hex is 0x580		    buf[TCP_OPTIONS_P]=2;		    buf[TCP_OPTIONS_P+1]=4;		    buf[TCP_OPTIONS_P+2]=0x05; 		    buf[TCP_OPTIONS_P+3]=0x80;		    // 24 bytes:		    buf[TCP_HEADER_LEN_P]=0x60;			}
		else
			{		    // no options:		    // 20 bytes:		    buf[TCP_HEADER_LEN_P]=0x50;			}	}void make_arp_answer_from_request(uint8_t *buf)	{	uint8_t i=0;	//	make_eth(buf);	buf[ETH_ARP_OPCODE_H_P]=ETH_ARP_OPCODE_REPLY_H_V;	buf[ETH_ARP_OPCODE_L_P]=ETH_ARP_OPCODE_REPLY_L_V;	// fill the mac addresses:	while(i<6)
		{        buf[ETH_ARP_DST_MAC_P+i]=buf[ETH_ARP_SRC_MAC_P+i];        buf[ETH_ARP_SRC_MAC_P+i]=macaddr[i];        i++;		}	i=0;	while(i<4)
		{        buf[ETH_ARP_DST_IP_P+i]=buf[ETH_ARP_SRC_IP_P+i];        buf[ETH_ARP_SRC_IP_P+i]=ipaddr[i];        i++;		}	// eth+arp is 42 bytes:	enc28j60PacketSend(42,buf); 	}void make_echo_reply_from_request(uint8_t *buf,uint16_t len)	{	make_eth(buf);	make_ip(buf);	buf[ICMP_TYPE_P]=ICMP_TYPE_ECHOREPLY_V;	  //////////////////////////////////////////////////////////////////////////////////	// we changed only the icmp.type field from request(=8) to reply(=0).	// we can therefore easily correct the checksum:	if (buf[ICMP_CHECKSUM_P] > (0xff-0x08))
		{	    buf[ICMP_CHECKSUM_P+1]++;		}	buf[ICMP_CHECKSUM_P]+=0x08;	//	enc28j60PacketSend(len,buf);	}// you can send a max of 220 bytes of datavoid make_udp_reply_from_request(uint8_t *buf,char *data,uint8_t datalen,uint16_t port)	{	uint8_t i=0;	uint16_t ck;	make_eth(buf);	if (datalen>220)
		{	    datalen=220;		}	// total length field in the IP header must be set:	buf[IP_TOTLEN_H_P]=0;	buf[IP_TOTLEN_L_P]=IP_HEADER_LEN+UDP_HEADER_LEN+datalen;	make_ip(buf);	buf[UDP_DST_PORT_H_P]=port>>8;	buf[UDP_DST_PORT_L_P]=port & 0xff;	// source port does not matter and is what the sender used.	// calculte the udp length:	buf[UDP_LEN_H_P]=0;	buf[UDP_LEN_L_P]=UDP_HEADER_LEN+datalen;	// zero the checksum	buf[UDP_CHECKSUM_H_P]=0;	buf[UDP_CHECKSUM_L_P]=0;	// copy the data:	while(i<datalen)
		{        buf[UDP_DATA_P+i]=data[i];        i++;		}	ck=checksum(&buf[IP_SRC_P], 16 + datalen,1);	buf[UDP_CHECKSUM_H_P]=ck>>8;	buf[UDP_CHECKSUM_L_P]=ck& 0xff;	enc28j60PacketSend(UDP_HEADER_LEN+IP_HEADER_LEN+ETH_HEADER_LEN+datalen,buf);	}void make_tcp_synack_from_syn(uint8_t *buf)	{	uint16_t ck;	make_eth(buf);	// total length field in the IP header must be set:	// 20 bytes IP + 24 bytes (20tcp+4tcp options)	buf[IP_TOTLEN_H_P]=0;	buf[IP_TOTLEN_L_P]=IP_HEADER_LEN+TCP_HEADER_LEN_PLAIN+4;	make_ip(buf);	buf[TCP_FLAGS_P]=TCP_FLAGS_SYNACK_V;	make_tcphead(buf,1,1,0);	// calculate the checksum, len=8 (start from ip.src) + TCP_HEADER_LEN_PLAIN + 4 (one option: mss)	ck=checksum(&buf[IP_SRC_P], 8+TCP_HEADER_LEN_PLAIN+4,2);	buf[TCP_CHECKSUM_H_P]=ck>>8;	buf[TCP_CHECKSUM_L_P]=ck& 0xff;	// add 4 for option mss:	enc28j60PacketSend(IP_HEADER_LEN+TCP_HEADER_LEN_PLAIN+4+ETH_HEADER_LEN,buf);	}// get a pointer to the start of tcp data in buf// Returns 0 if there is no data// You must call init_len_info once before calling this functionuint16_t get_tcp_data_pointer(void)	{	if (info_data_len)
			{	        return((uint16_t)TCP_SRC_PORT_H_P+info_hdr_len);			}
		else
			{	        return(0);			}	}// do some basic length calculations and store the result in static varibalesvoid init_len_info(uint8_t *buf)	{    info_data_len=(buf[IP_TOTLEN_H_P]<<8)|(buf[IP_TOTLEN_L_P]&0xff);    info_data_len-=IP_HEADER_LEN;    info_hdr_len=(buf[TCP_HEADER_LEN_P]>>4)*4; // generate len in bytes;    info_data_len-=info_hdr_len;    if (info_data_len<=0)
		{        info_data_len=0;    	}	}// fill in tcp data at position pos. pos=0 means start of// tcp data. Returns the position at which the string after// this string could be filled.uint16_t fill_tcp_data_p(uint8_t *buf,uint16_t pos, const prog_char *progmem_s)	{	char c;	// fill in tcp data at position pos	//	// with no options the data starts after the checksum + 2 more bytes (urgent ptr)	while ((c = pgm_read_byte(progmem_s++))) 
		{	    buf[TCP_CHECKSUM_L_P+3+pos]=c;	    pos++;		}	return(pos);	}// fill in tcp data at position pos. pos=0 means start of// tcp data. Returns the position at which the string after// this string could be filled.uint16_t fill_tcp_data(uint8_t *buf,uint16_t pos, const char *s)	{	// fill in tcp data at position pos	//	// with no options the data starts after the checksum + 2 more bytes (urgent ptr)	while (*s) 
		{	    buf[TCP_CHECKSUM_L_P+3+pos]=*s;	    pos++;	    s++;		}	return(pos);	}// Make just an ack packet with no tcp data inside// This will modify the eth/ip/tcp header void make_tcp_ack_from_any(uint8_t *buf)	{	uint16_t j;	make_eth(buf);	// fill the header:	buf[TCP_FLAGS_P]=TCP_FLAGS_ACK_V;	if (info_data_len==0)
			{	        // if there is no data then we must still acknoledge one packet	        make_tcphead(buf,1,0,1); // no options			}
		else
			{	        make_tcphead(buf,info_data_len,0,1); // no options			}		// total length field in the IP header must be set:	// 20 bytes IP + 20 bytes tcp (when no options) 	j=IP_HEADER_LEN+TCP_HEADER_LEN_PLAIN;	buf[IP_TOTLEN_H_P]=j>>8;	buf[IP_TOTLEN_L_P]=j& 0xff;	make_ip(buf);	// calculate the checksum, len=8 (start from ip.src) + TCP_HEADER_LEN_PLAIN + data len	j=checksum(&buf[IP_SRC_P], 8+TCP_HEADER_LEN_PLAIN,2);	buf[TCP_CHECKSUM_H_P]=j>>8;	buf[TCP_CHECKSUM_L_P]=j& 0xff;	enc28j60PacketSend(IP_HEADER_LEN+TCP_HEADER_LEN_PLAIN+ETH_HEADER_LEN,buf);	}// you must have called init_len_info at some time before calling this function// dlen is the amount of tcp data (http data) we send in this packet// You can use this function only immediately after make_tcp_ack_from_any// This is because this function will NOT modify the eth/ip/tcp header except for// length and checksumvoid make_tcp_ack_with_data(uint8_t *buf,uint16_t dlen)	{	uint16_t j;	// fill the header:	// This code requires that we send only one data packet	// because we keep no state information. We must therefore set	// the fin here:	buf[TCP_FLAGS_P]=TCP_FLAGS_ACK_V|TCP_FLAGS_PUSH_V|TCP_FLAGS_FIN_V;		// total length field in the IP header must be set:	// 20 bytes IP + 20 bytes tcp (when no options) + len of data	j=IP_HEADER_LEN+TCP_HEADER_LEN_PLAIN+dlen;	buf[IP_TOTLEN_H_P]=j>>8;	buf[IP_TOTLEN_L_P]=j& 0xff;	fill_ip_hdr_checksum(buf);	// zero the checksum	buf[TCP_CHECKSUM_H_P]=0;	buf[TCP_CHECKSUM_L_P]=0;	// calculate the checksum, len=8 (start from ip.src) + TCP_HEADER_LEN_PLAIN + data len	j=checksum(&buf[IP_SRC_P], 8+TCP_HEADER_LEN_PLAIN+dlen,2);	buf[TCP_CHECKSUM_H_P]=j>>8;	buf[TCP_CHECKSUM_L_P]=j& 0xff;	enc28j60PacketSend(IP_HEADER_LEN+TCP_HEADER_LEN_PLAIN+dlen+ETH_HEADER_LEN,buf);	}/* end of ip_arp_udp.c */

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美专区亚洲专区| 1000部国产精品成人观看| 国产清纯白嫩初高生在线观看91 | 亚洲国产精品久久久久婷婷884| 蜜臀久久99精品久久久久久9| 不卡视频免费播放| 337p日本欧洲亚洲大胆精品| 亚洲一卡二卡三卡四卡| 成人午夜视频在线观看| 日韩亚洲欧美在线观看| 亚洲一二三区视频在线观看| 99re这里只有精品首页| 久久精品欧美日韩| 玖玖九九国产精品| 日韩欧美国产一区在线观看| 亚洲小说春色综合另类电影| av一区二区不卡| 欧美国产精品一区| 国产乱人伦偷精品视频不卡| 精品国产亚洲在线| 免费在线观看不卡| 欧美一区二区三区公司| 亚洲一区在线观看视频| 色噜噜狠狠成人中文综合| 国产精品女同一区二区三区| 成人午夜视频福利| 中文字幕av资源一区| 国产成人免费在线观看| 国产欧美一区二区精品秋霞影院| 激情国产一区二区 | 久久久久国产精品麻豆ai换脸 | 亚洲综合自拍偷拍| 在线观看视频91| 一区二区三区在线视频观看58| 波波电影院一区二区三区| 中文字幕亚洲区| 色综合久久久久网| 综合激情网...| 日本大香伊一区二区三区| 亚洲精选一二三| 色一情一伦一子一伦一区| 亚洲欧美国产高清| 在线观看国产日韩| 日韩和的一区二区| 欧美一区二区大片| 国内外精品视频| 国产亚洲制服色| 一本大道av一区二区在线播放| 亚洲欧美国产毛片在线| 在线成人av影院| 久久成人精品无人区| 日本一区二区三区久久久久久久久不 | 偷窥国产亚洲免费视频| 91.com视频| 久久99热99| 最新国产精品久久精品| 欧美三级中文字| 极品尤物av久久免费看| 国产精品久久毛片| 欧美日韩精品一区二区天天拍小说| 日韩av不卡一区二区| 国产精品网友自拍| 欧美日韩成人综合天天影院| 国产自产高清不卡| 亚洲一级二级三级在线免费观看| 欧美成人video| 成人禁用看黄a在线| 天天色天天操综合| 国产精品女同一区二区三区| 欧美日本免费一区二区三区| 国产成人午夜高潮毛片| 亚洲成人av福利| 国产精品久久久久久久第一福利| 这里是久久伊人| 99久久精品国产网站| 免费久久99精品国产| 国产精品不卡一区二区三区| 日韩欧美一级二级三级久久久| 北条麻妃一区二区三区| 久久精品国产亚洲一区二区三区| 亚洲欧美一区二区在线观看| 日韩你懂的电影在线观看| 色婷婷亚洲精品| 国产盗摄女厕一区二区三区| 免费精品视频在线| 亚洲一区二区偷拍精品| 国产精品不卡视频| 久久久激情视频| 精品少妇一区二区三区视频免付费| 日本高清不卡在线观看| av在线播放成人| 国产精品资源在线观看| 美女脱光内衣内裤视频久久网站| 亚洲视频图片小说| 欧美经典一区二区三区| 精品久久人人做人人爽| 3atv一区二区三区| 欧美综合视频在线观看| 成人激情视频网站| 国产成人av一区二区三区在线| 美国毛片一区二区| 午夜影视日本亚洲欧洲精品| 亚洲三级小视频| 亚洲视频狠狠干| 国产精品乱码一区二区三区软件| 日韩精品在线网站| 日韩精品一区二区三区四区 | 久久成人免费电影| 青青草成人在线观看| 午夜精品aaa| 丝袜美腿亚洲一区二区图片| 亚洲h在线观看| 午夜精品免费在线观看| 首页国产欧美久久| 视频一区二区国产| 毛片一区二区三区| 美女视频一区在线观看| 久久精品国产久精国产爱| 久久99精品久久久久久国产越南 | 香蕉久久一区二区不卡无毒影院| 一区二区欧美国产| 亚洲一区在线观看免费| 亚洲国产精品一区二区尤物区| 亚洲在线视频网站| 天天综合网 天天综合色| 日韩电影免费在线看| 青草国产精品久久久久久| 另类欧美日韩国产在线| 国产福利一区二区三区| 99热99精品| 欧美色图在线观看| 日韩视频一区在线观看| 久久久精品天堂| 亚洲人妖av一区二区| 亚洲成a人片在线不卡一二三区| 日韩国产高清影视| 国模少妇一区二区三区| 成人av在线资源| 欧美精品在线观看播放| 久久日韩粉嫩一区二区三区 | 色丁香久综合在线久综合在线观看| 91碰在线视频| 91精品国产黑色紧身裤美女| 久久影院视频免费| 亚洲免费在线看| 麻豆国产精品一区二区三区 | 国产美女久久久久| 色综合天天综合网天天狠天天| 欧美另类z0zxhd电影| 欧美激情综合五月色丁香小说| 亚洲女同女同女同女同女同69| 天堂成人免费av电影一区| 国产精品亚洲专一区二区三区| 在线观看日韩电影| www久久精品| 亚洲一区二区不卡免费| 国产成人午夜视频| 欧美另类久久久品| 18成人在线观看| 久久不见久久见免费视频1| 色偷偷成人一区二区三区91| 欧美精品一区视频| 午夜精品久久久久久久| 99精品欧美一区| 久久久久免费观看| 免费成人美女在线观看| 日本久久一区二区三区| 久久夜色精品一区| 亚洲成av人片在线观看| 99视频精品免费视频| 久久午夜色播影院免费高清| 亚洲图片一区二区| 91在线小视频| 中文字幕欧美区| 韩国一区二区视频| 日韩欧美国产三级| 亚洲成人自拍一区| 91麻豆精东视频| 国产精品少妇自拍| 国产一区 二区| 日韩欧美国产电影| 免费人成网站在线观看欧美高清| 色八戒一区二区三区| 国产精品三级久久久久三级| 精久久久久久久久久久| 日韩一卡二卡三卡国产欧美| 亚洲欧美日韩在线| 91网站在线播放| 成人免费小视频| www.欧美色图| 亚洲视频免费在线| 91丨porny丨户外露出| 国产精品的网站| 色综合中文字幕| 亚洲男人的天堂在线aⅴ视频| 99re这里都是精品| 亚洲欧美自拍偷拍| 91国偷自产一区二区三区观看 | 久久国产乱子精品免费女| 欧美日韩夫妻久久|