亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? pac.c

?? samba最新軟件
?? C
?? 第 1 頁 / 共 2 頁
字號:
/*    Unix SMB/CIFS implementation.   Validate the krb5 pac generation routines      Copyright (C) Andrew Bartlett <abartlet@samba.org> 2005   This program is free software; you can redistribute it and/or modify   it under the terms of the GNU General Public License as published by   the Free Software Foundation; either version 3 of the License, or   (at your option) any later version.      This program is distributed in the hope that it will be useful,   but WITHOUT ANY WARRANTY; without even the implied warranty of   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the   GNU General Public License for more details.      You should have received a copy of the GNU General Public License   along with this program.  If not, see <http://www.gnu.org/licenses/>.*/#include "includes.h"#include "system/kerberos.h"#include "auth/auth.h"#include "auth/kerberos/kerberos.h"#include "librpc/gen_ndr/ndr_krb5pac.h"#include "samba3/samba3.h"#include "libcli/security/security.h"#include "torture/torture.h"#include "auth/session_proto.h"static bool torture_pac_self_check(struct torture_context *tctx){	NTSTATUS nt_status;	DATA_BLOB tmp_blob;	struct PAC_DATA *pac_data;	struct PAC_LOGON_INFO *logon_info;	union netr_Validation validation;	/* Generate a nice, arbitary keyblock */	uint8_t server_bytes[16];	uint8_t krbtgt_bytes[16];	krb5_keyblock server_keyblock;	krb5_keyblock krbtgt_keyblock;		krb5_error_code ret;	struct smb_krb5_context *smb_krb5_context;	struct auth_serversupplied_info *server_info;	struct auth_serversupplied_info *server_info_out;	krb5_principal client_principal;	time_t logon_time = time(NULL);	TALLOC_CTX *mem_ctx = tctx;	torture_assert(tctx, 0 == smb_krb5_init_context(mem_ctx, 							NULL,							tctx->lp_ctx,							&smb_krb5_context), 		       "smb_krb5_init_context");	generate_random_buffer(server_bytes, 16);	generate_random_buffer(krbtgt_bytes, 16);	ret = krb5_keyblock_init(smb_krb5_context->krb5_context,				 ENCTYPE_ARCFOUR_HMAC,				 server_bytes, sizeof(server_bytes),				 &server_keyblock);	torture_assert(tctx, !ret, talloc_asprintf(tctx, 						   "(self test) Server Keyblock encoding failed: %s", 						   smb_get_krb5_error_message(smb_krb5_context->krb5_context, 									      ret, mem_ctx)));	ret = krb5_keyblock_init(smb_krb5_context->krb5_context,				 ENCTYPE_ARCFOUR_HMAC,				 krbtgt_bytes, sizeof(krbtgt_bytes),				 &krbtgt_keyblock);	if (ret) {		char *err = smb_get_krb5_error_message(smb_krb5_context->krb5_context, 						       ret, mem_ctx);			krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &server_keyblock);		torture_fail(tctx, talloc_asprintf(tctx, 						   "(self test) KRBTGT Keyblock encoding failed: %s", err));	}	/* We need an input, and this one requires no underlying database */	nt_status = auth_anonymous_server_info(mem_ctx, lp_netbios_name(tctx->lp_ctx), &server_info);	if (!NT_STATUS_IS_OK(nt_status)) {		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &server_keyblock);		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &krbtgt_keyblock);		torture_fail(tctx, "auth_anonymous_server_info");	}	ret = krb5_parse_name_flags(smb_krb5_context->krb5_context, 				    server_info->account_name, 				    KRB5_PRINCIPAL_PARSE_NO_REALM, 				    &client_principal);	if (ret) {		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &server_keyblock);		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &krbtgt_keyblock);		torture_fail(tctx, "krb5_parse_name_flags(norealm)");	}	/* OK, go ahead and make a PAC */	ret = kerberos_create_pac(mem_ctx, 				  lp_iconv_convenience(tctx->lp_ctx),				  server_info, 				  smb_krb5_context->krb5_context,  				  &krbtgt_keyblock,				  &server_keyblock,				  client_principal,				  logon_time,				  &tmp_blob);		if (ret) {		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &krbtgt_keyblock);		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &server_keyblock);		krb5_free_principal(smb_krb5_context->krb5_context, 				    client_principal);		torture_fail(tctx, talloc_asprintf(tctx,						   "(self test) PAC encoding failed: %s", 						   smb_get_krb5_error_message(smb_krb5_context->krb5_context, 									      ret, mem_ctx)));	}	dump_data(10,tmp_blob.data,tmp_blob.length);	/* Now check that we can read it back */	nt_status = kerberos_decode_pac(mem_ctx, 					lp_iconv_convenience(tctx->lp_ctx),					&pac_data,					tmp_blob,					smb_krb5_context->krb5_context,					&krbtgt_keyblock,					&server_keyblock,					client_principal, 					logon_time, NULL);	if (!NT_STATUS_IS_OK(nt_status)) {		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &krbtgt_keyblock);		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &server_keyblock);		krb5_free_principal(smb_krb5_context->krb5_context, 				    client_principal);		torture_fail(tctx, talloc_asprintf(tctx,						   "(self test) PAC decoding failed: %s", 						   nt_errstr(nt_status)));	}	/* Now check that we can read it back */	nt_status = kerberos_pac_logon_info(mem_ctx, 					    lp_iconv_convenience(tctx->lp_ctx),					    &logon_info,					    tmp_blob,					    smb_krb5_context->krb5_context,					    &krbtgt_keyblock,					    &server_keyblock,					    client_principal, 					    logon_time, 					    NULL);		if (!NT_STATUS_IS_OK(nt_status)) {		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &krbtgt_keyblock);		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &server_keyblock);		krb5_free_principal(smb_krb5_context->krb5_context, 				    client_principal);				torture_fail(tctx,  			     talloc_asprintf(tctx, 					     "(self test) PAC decoding (for logon info) failed: %s", 					     nt_errstr(nt_status)));	}		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 				    &krbtgt_keyblock);	krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 				    &server_keyblock);	krb5_free_principal(smb_krb5_context->krb5_context, 			    client_principal);	validation.sam3 = &logon_info->info3;	nt_status = make_server_info_netlogon_validation(mem_ctx,							 "",							 3, &validation,							 &server_info_out); 	if (!NT_STATUS_IS_OK(nt_status)) {		torture_fail(tctx, 			     talloc_asprintf(tctx, 					     "(self test) PAC decoding (make server info) failed: %s", 					     nt_errstr(nt_status)));	}		if (!dom_sid_equal(server_info->account_sid, 			   server_info_out->account_sid)) {		torture_fail(tctx,  			     talloc_asprintf(tctx, 					     "(self test) PAC Decode resulted in *different* domain SID: %s != %s",					     dom_sid_string(mem_ctx, server_info->account_sid), 					     dom_sid_string(mem_ctx, server_info_out->account_sid)));	}	return true;}/* This is the PAC generated on my test network, by my test Win2k3 server.   -- abartlet 2005-07-04*/static const uint8_t saved_pac[] = {	0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0xd8, 0x01, 0x00, 0x00, 	0x48, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x0a, 0x00, 0x00, 0x00, 0x20, 0x00, 0x00, 0x00,	0x20, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x14, 0x00, 0x00, 0x00,	0x40, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x07, 0x00, 0x00, 0x00, 0x14, 0x00, 0x00, 0x00,	0x58, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x10, 0x08, 0x00, 0xcc, 0xcc, 0xcc, 0xcc,	0xc8, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x30, 0xdf, 0xa6, 0xcb, 	0x4f, 0x7d, 0xc5, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x7f, 0xff, 0xff, 0xff, 0xff, 	0xff, 0xff, 0xff, 0x7f, 0xc0, 0x3c, 0x4e, 0x59, 0x62, 0x73, 0xc5, 0x01, 0xc0, 0x3c, 0x4e, 0x59,	0x62, 0x73, 0xc5, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x7f, 0x16, 0x00, 0x16, 0x00,	0x04, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x08, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00,	0x0c, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 	0x14, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x18, 0x00, 0x02, 0x00, 0x65, 0x00, 0x00, 0x00, 	0xed, 0x03, 0x00, 0x00, 0x04, 0x02, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x1c, 0x00, 0x02, 0x00,	0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x00, 0x00, 0x00, 0x00, 0x14, 0x00, 0x16, 0x00, 0x20, 0x00, 0x02, 0x00, 0x16, 0x00, 0x18, 0x00,	0x24, 0x00, 0x02, 0x00, 0x28, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x00, 0x21, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x01, 0x00, 0x00, 0x00, 0x2c, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x00, 0x00, 0x00, 0x00, 0x0b, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x0b, 0x00, 0x00, 0x00,	0x57, 0x00, 0x32, 0x00, 0x30, 0x00, 0x30, 0x00, 0x33, 0x00, 0x46, 0x00, 0x49, 0x00, 0x4e, 0x00,	0x41, 0x00, 0x4c, 0x00, 0x24, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x04, 0x02, 0x00, 0x00, 0x07, 0x00, 0x00, 0x00,	0x0b, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x0a, 0x00, 0x00, 0x00, 0x57, 0x00, 0x32, 0x00,	0x30, 0x00, 0x30, 0x00, 0x33, 0x00, 0x46, 0x00, 0x49, 0x00, 0x4e, 0x00, 0x41, 0x00, 0x4c, 0x00,	0x0c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x0b, 0x00, 0x00, 0x00, 0x57, 0x00, 0x49, 0x00,	0x4e, 0x00, 0x32, 0x00, 0x4b, 0x00, 0x33, 0x00, 0x54, 0x00, 0x48, 0x00, 0x49, 0x00, 0x4e, 0x00,	0x4b, 0x00, 0x00, 0x00, 0x04, 0x00, 0x00, 0x00, 0x01, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x05,	0x15, 0x00, 0x00, 0x00, 0x11, 0x2f, 0xaf, 0xb5, 0x90, 0x04, 0x1b, 0xec, 0x50, 0x3b, 0xec, 0xdc,	0x01, 0x00, 0x00, 0x00, 0x30, 0x00, 0x02, 0x00, 0x07, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00,	0x01, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x05, 0x09, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x80, 0x66, 0x28, 0xea, 0x37, 0x80, 0xc5, 0x01, 0x16, 0x00, 0x77, 0x00, 0x32, 0x00, 0x30, 0x00,	0x30, 0x00, 0x33, 0x00, 0x66, 0x00, 0x69, 0x00, 0x6e, 0x00, 0x61, 0x00, 0x6c, 0x00, 0x24, 0x00,	0x76, 0xff, 0xff, 0xff, 0x37, 0xd5, 0xb0, 0xf7, 0x24, 0xf0, 0xd6, 0xd4, 0xec, 0x09, 0x86, 0x5a,	0xa0, 0xe8, 0xc3, 0xa9, 0x00, 0x00, 0x00, 0x00, 0x76, 0xff, 0xff, 0xff, 0xb4, 0xd8, 0xb8, 0xfe,	0x83, 0xb3, 0x13, 0x3f, 0xfc, 0x5c, 0x41, 0xad, 0xe2, 0x64, 0x83, 0xe0, 0x00, 0x00, 0x00, 0x00};/* Check with a known 'well formed' PAC, from my test server */static bool torture_pac_saved_check(struct torture_context *tctx){	NTSTATUS nt_status;	enum ndr_err_code ndr_err;	DATA_BLOB tmp_blob, validate_blob;	struct PAC_DATA *pac_data, pac_data2;	struct PAC_LOGON_INFO *logon_info;	union netr_Validation validation;	const char *pac_file, *pac_kdc_key, *pac_member_key;	struct auth_serversupplied_info *server_info_out;	krb5_keyblock server_keyblock;	krb5_keyblock krbtgt_keyblock;	struct samr_Password *krbtgt_bytes, *krbsrv_bytes;		krb5_error_code ret;	struct smb_krb5_context *smb_krb5_context;	const char *principal_string;	char *broken_principal_string;	krb5_principal client_principal;	const char *authtime_string;	time_t authtime;	TALLOC_CTX *mem_ctx = tctx;	torture_assert(tctx, 0 == smb_krb5_init_context(mem_ctx, NULL,							tctx->lp_ctx,							&smb_krb5_context),		       "smb_krb5_init_context");	pac_kdc_key = torture_setting_string(tctx, "pac_kdc_key", 					     "B286757148AF7FD252C53603A150B7E7");	pac_member_key = torture_setting_string(tctx, "pac_member_key", 						"D217FAEAE5E6B5F95CCC94077AB8A5FC");	torture_comment(tctx, "Using pac_kdc_key '%s'\n", pac_kdc_key);	torture_comment(tctx, "Using pac_member_key '%s'\n", pac_member_key);	/* The krbtgt key in use when the above PAC was generated.	 * This is an arcfour-hmac-md5 key, extracted with our 'net	 * samdump' tool. */	krbtgt_bytes = smbpasswd_gethexpwd(mem_ctx, pac_kdc_key);	if (!krbtgt_bytes) {		torture_fail(tctx, "(saved test) Could not interpret krbtgt key");	}	krbsrv_bytes = smbpasswd_gethexpwd(mem_ctx, pac_member_key);	if (!krbsrv_bytes) {		torture_fail(tctx, "(saved test) Could not interpret krbsrv key");	}	ret = krb5_keyblock_init(smb_krb5_context->krb5_context,				 ENCTYPE_ARCFOUR_HMAC,				 krbsrv_bytes->hash, sizeof(krbsrv_bytes->hash),				 &server_keyblock);	torture_assert(tctx, !ret,		       talloc_asprintf(tctx,				       "(saved test) Server Keyblock encoding failed: %s", 				       smb_get_krb5_error_message(smb_krb5_context->krb5_context, 								  ret, mem_ctx)));	ret = krb5_keyblock_init(smb_krb5_context->krb5_context,				 ENCTYPE_ARCFOUR_HMAC,				 krbtgt_bytes->hash, sizeof(krbtgt_bytes->hash),				 &krbtgt_keyblock);	if (ret) {		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &server_keyblock);

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩一二三四区| 欧美一级视频精品观看| 国产视频亚洲色图| 高清beeg欧美| 亚洲人123区| 欧美剧情片在线观看| 蜜臀av性久久久久蜜臀aⅴ流畅| 欧美一区二区三区影视| 精品中文字幕一区二区| 国产午夜精品在线观看| 91丨九色丨蝌蚪丨老版| 亚洲高清视频在线| 日韩免费高清av| 国产成人免费视频精品含羞草妖精| 国产免费观看久久| 欧洲精品在线观看| 裸体一区二区三区| 国产精品视频看| 欧美三电影在线| 麻豆精品久久精品色综合| 欧美精品一区二| 91无套直看片红桃| 欧美aaaaa成人免费观看视频| 亚洲精品在线观看网站| 91丨porny丨首页| 免费视频一区二区| 国产精品欧美精品| 884aa四虎影成人精品一区| 国产九色sp调教91| 一区二区国产视频| 久久久久久久国产精品影院| 欧洲精品中文字幕| 国产精华液一区二区三区| 亚洲观看高清完整版在线观看| 欧美大胆人体bbbb| 91福利视频网站| 高清在线不卡av| 日韩精品一区第一页| 一区视频在线播放| 日韩女优制服丝袜电影| 一本大道久久a久久综合| 久久99精品国产91久久来源| 亚洲人被黑人高潮完整版| 精品国产区一区| 欧美午夜精品一区二区蜜桃 | 欧美一三区三区四区免费在线看| 国产一区二区福利| 日本大胆欧美人术艺术动态| 亚洲欧美一区二区三区国产精品| 欧美精品一区二区三区四区| 欧美日韩精品是欧美日韩精品| 成人av电影免费观看| 精品一区二区三区影院在线午夜| 亚洲午夜私人影院| 亚洲欧美在线观看| 国产网站一区二区| 精品国产免费久久| 欧美福利视频导航| 91久久国产最好的精华液| 成人一区二区三区视频| 久久国产欧美日韩精品| 丝袜美腿亚洲一区| 亚洲高清视频的网址| 亚洲狠狠丁香婷婷综合久久久| 欧美国产日韩亚洲一区| 久久免费偷拍视频| 精品福利一区二区三区| 日韩欧美一级片| 日韩欧美在线综合网| 日韩一级黄色大片| 日韩一级高清毛片| 欧美大尺度电影在线| 91精品国产乱码| 欧美一区二区在线看| 欧美男男青年gay1069videost| 在线免费一区三区| 在线国产电影不卡| 欧美系列亚洲系列| 欧美日韩黄色影视| 91精品一区二区三区久久久久久 | 亚洲.国产.中文慕字在线| 一卡二卡三卡日韩欧美| 亚洲一区国产视频| 一区二区三区在线免费视频| 一区二区不卡在线播放| 午夜久久久久久久久| 日韩主播视频在线| 精品一区二区三区在线视频| 国内成+人亚洲+欧美+综合在线| 国产真实乱对白精彩久久| 国产成人亚洲综合a∨婷婷| 国产+成+人+亚洲欧洲自线| 99久久精品国产导航| 91高清视频免费看| 正在播放亚洲一区| 久久伊人中文字幕| 国产精品麻豆欧美日韩ww| 亚洲男人的天堂av| 日韩激情在线观看| av影院午夜一区| 日本精品一级二级| 欧美一级久久久| 国产欧美日韩激情| 亚洲一二三区不卡| 久久99精品国产91久久来源| 国产成人av网站| 欧洲视频一区二区| 精品伦理精品一区| 亚洲视频免费在线| 美腿丝袜一区二区三区| 不卡一区二区中文字幕| 欧美日韩一区不卡| 国产欧美日韩激情| 亚洲高清久久久| 国产黄色91视频| 欧美日韩精品一区视频| 国产午夜亚洲精品理论片色戒 | 老司机午夜精品| 成人丝袜18视频在线观看| 欧美日韩免费在线视频| 26uuu另类欧美| 亚洲丶国产丶欧美一区二区三区| 狠狠色丁香婷综合久久| 色噜噜久久综合| 国产午夜久久久久| 午夜激情一区二区| 成人午夜大片免费观看| 欧美日本一区二区| 国产精品视频在线看| 日韩精品1区2区3区| 97精品视频在线观看自产线路二| 欧美顶级少妇做爰| 亚洲精品成人悠悠色影视| 精品中文字幕一区二区小辣椒| 91免费视频大全| 国产日韩欧美电影| 日本亚洲三级在线| 欧洲av一区二区嗯嗯嗯啊| 亚洲精品在线三区| 奇米亚洲午夜久久精品| 在线免费精品视频| 国产精品久久久久aaaa| 韩国精品一区二区| 69久久夜色精品国产69蝌蚪网| 亚洲人成网站色在线观看| 国产精品自拍在线| 欧美一区二区三区免费在线看| 亚洲你懂的在线视频| 东方欧美亚洲色图在线| 欧美mv日韩mv国产网站app| 午夜亚洲福利老司机| 在线区一区二视频| 一区二区三区精品在线观看| 不卡区在线中文字幕| 国产欧美精品一区二区色综合朱莉| 免费观看在线综合| 9191国产精品| 五月天一区二区三区| 在线免费不卡视频| 亚洲欧美另类在线| 91麻豆产精品久久久久久| 国产精品久久久久久福利一牛影视| 韩国视频一区二区| 精品三级在线看| 狠狠色狠狠色综合系列| 欧美tk—视频vk| 黄色日韩三级电影| 久久久高清一区二区三区| 国产老女人精品毛片久久| 久久这里只有精品首页| 国产一区二区成人久久免费影院 | 久久久影视传媒| 国产精品一区三区| 日本一区二区三区久久久久久久久不| 国产米奇在线777精品观看| 久久久久久久综合色一本| 国产传媒日韩欧美成人| 国产精品欧美久久久久无广告 | 亚洲三级视频在线观看| 色综合久久六月婷婷中文字幕| 亚洲欧洲日产国产综合网| 91麻豆.com| 午夜不卡在线视频| 精品美女被调教视频大全网站| 国产一区免费电影| 中文字幕日韩精品一区| 欧美亚洲一区二区在线| 性感美女久久精品| 精品三级在线看| 国产91在线看| 亚洲欧美乱综合| 欧美高清dvd| 国产精品1区2区| 亚洲色图欧美偷拍| 91麻豆精品国产91| 成人午夜视频福利| 亚洲一区二区视频在线观看| 欧美电视剧免费全集观看| 高清视频一区二区| 亚洲成人动漫在线免费观看|