亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? pac.c

?? samba最新軟件
?? C
?? 第 1 頁 / 共 2 頁
字號:
/*    Unix SMB/CIFS implementation.   Validate the krb5 pac generation routines      Copyright (C) Andrew Bartlett <abartlet@samba.org> 2005   This program is free software; you can redistribute it and/or modify   it under the terms of the GNU General Public License as published by   the Free Software Foundation; either version 3 of the License, or   (at your option) any later version.      This program is distributed in the hope that it will be useful,   but WITHOUT ANY WARRANTY; without even the implied warranty of   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the   GNU General Public License for more details.      You should have received a copy of the GNU General Public License   along with this program.  If not, see <http://www.gnu.org/licenses/>.*/#include "includes.h"#include "system/kerberos.h"#include "auth/auth.h"#include "auth/kerberos/kerberos.h"#include "librpc/gen_ndr/ndr_krb5pac.h"#include "samba3/samba3.h"#include "libcli/security/security.h"#include "torture/torture.h"#include "auth/session_proto.h"static bool torture_pac_self_check(struct torture_context *tctx){	NTSTATUS nt_status;	DATA_BLOB tmp_blob;	struct PAC_DATA *pac_data;	struct PAC_LOGON_INFO *logon_info;	union netr_Validation validation;	/* Generate a nice, arbitary keyblock */	uint8_t server_bytes[16];	uint8_t krbtgt_bytes[16];	krb5_keyblock server_keyblock;	krb5_keyblock krbtgt_keyblock;		krb5_error_code ret;	struct smb_krb5_context *smb_krb5_context;	struct auth_serversupplied_info *server_info;	struct auth_serversupplied_info *server_info_out;	krb5_principal client_principal;	time_t logon_time = time(NULL);	TALLOC_CTX *mem_ctx = tctx;	torture_assert(tctx, 0 == smb_krb5_init_context(mem_ctx, 							NULL,							tctx->lp_ctx,							&smb_krb5_context), 		       "smb_krb5_init_context");	generate_random_buffer(server_bytes, 16);	generate_random_buffer(krbtgt_bytes, 16);	ret = krb5_keyblock_init(smb_krb5_context->krb5_context,				 ENCTYPE_ARCFOUR_HMAC,				 server_bytes, sizeof(server_bytes),				 &server_keyblock);	torture_assert(tctx, !ret, talloc_asprintf(tctx, 						   "(self test) Server Keyblock encoding failed: %s", 						   smb_get_krb5_error_message(smb_krb5_context->krb5_context, 									      ret, mem_ctx)));	ret = krb5_keyblock_init(smb_krb5_context->krb5_context,				 ENCTYPE_ARCFOUR_HMAC,				 krbtgt_bytes, sizeof(krbtgt_bytes),				 &krbtgt_keyblock);	if (ret) {		char *err = smb_get_krb5_error_message(smb_krb5_context->krb5_context, 						       ret, mem_ctx);			krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &server_keyblock);		torture_fail(tctx, talloc_asprintf(tctx, 						   "(self test) KRBTGT Keyblock encoding failed: %s", err));	}	/* We need an input, and this one requires no underlying database */	nt_status = auth_anonymous_server_info(mem_ctx, lp_netbios_name(tctx->lp_ctx), &server_info);	if (!NT_STATUS_IS_OK(nt_status)) {		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &server_keyblock);		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &krbtgt_keyblock);		torture_fail(tctx, "auth_anonymous_server_info");	}	ret = krb5_parse_name_flags(smb_krb5_context->krb5_context, 				    server_info->account_name, 				    KRB5_PRINCIPAL_PARSE_NO_REALM, 				    &client_principal);	if (ret) {		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &server_keyblock);		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &krbtgt_keyblock);		torture_fail(tctx, "krb5_parse_name_flags(norealm)");	}	/* OK, go ahead and make a PAC */	ret = kerberos_create_pac(mem_ctx, 				  lp_iconv_convenience(tctx->lp_ctx),				  server_info, 				  smb_krb5_context->krb5_context,  				  &krbtgt_keyblock,				  &server_keyblock,				  client_principal,				  logon_time,				  &tmp_blob);		if (ret) {		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &krbtgt_keyblock);		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &server_keyblock);		krb5_free_principal(smb_krb5_context->krb5_context, 				    client_principal);		torture_fail(tctx, talloc_asprintf(tctx,						   "(self test) PAC encoding failed: %s", 						   smb_get_krb5_error_message(smb_krb5_context->krb5_context, 									      ret, mem_ctx)));	}	dump_data(10,tmp_blob.data,tmp_blob.length);	/* Now check that we can read it back */	nt_status = kerberos_decode_pac(mem_ctx, 					lp_iconv_convenience(tctx->lp_ctx),					&pac_data,					tmp_blob,					smb_krb5_context->krb5_context,					&krbtgt_keyblock,					&server_keyblock,					client_principal, 					logon_time, NULL);	if (!NT_STATUS_IS_OK(nt_status)) {		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &krbtgt_keyblock);		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &server_keyblock);		krb5_free_principal(smb_krb5_context->krb5_context, 				    client_principal);		torture_fail(tctx, talloc_asprintf(tctx,						   "(self test) PAC decoding failed: %s", 						   nt_errstr(nt_status)));	}	/* Now check that we can read it back */	nt_status = kerberos_pac_logon_info(mem_ctx, 					    lp_iconv_convenience(tctx->lp_ctx),					    &logon_info,					    tmp_blob,					    smb_krb5_context->krb5_context,					    &krbtgt_keyblock,					    &server_keyblock,					    client_principal, 					    logon_time, 					    NULL);		if (!NT_STATUS_IS_OK(nt_status)) {		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &krbtgt_keyblock);		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &server_keyblock);		krb5_free_principal(smb_krb5_context->krb5_context, 				    client_principal);				torture_fail(tctx,  			     talloc_asprintf(tctx, 					     "(self test) PAC decoding (for logon info) failed: %s", 					     nt_errstr(nt_status)));	}		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 				    &krbtgt_keyblock);	krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 				    &server_keyblock);	krb5_free_principal(smb_krb5_context->krb5_context, 			    client_principal);	validation.sam3 = &logon_info->info3;	nt_status = make_server_info_netlogon_validation(mem_ctx,							 "",							 3, &validation,							 &server_info_out); 	if (!NT_STATUS_IS_OK(nt_status)) {		torture_fail(tctx, 			     talloc_asprintf(tctx, 					     "(self test) PAC decoding (make server info) failed: %s", 					     nt_errstr(nt_status)));	}		if (!dom_sid_equal(server_info->account_sid, 			   server_info_out->account_sid)) {		torture_fail(tctx,  			     talloc_asprintf(tctx, 					     "(self test) PAC Decode resulted in *different* domain SID: %s != %s",					     dom_sid_string(mem_ctx, server_info->account_sid), 					     dom_sid_string(mem_ctx, server_info_out->account_sid)));	}	return true;}/* This is the PAC generated on my test network, by my test Win2k3 server.   -- abartlet 2005-07-04*/static const uint8_t saved_pac[] = {	0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0xd8, 0x01, 0x00, 0x00, 	0x48, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x0a, 0x00, 0x00, 0x00, 0x20, 0x00, 0x00, 0x00,	0x20, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x14, 0x00, 0x00, 0x00,	0x40, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x07, 0x00, 0x00, 0x00, 0x14, 0x00, 0x00, 0x00,	0x58, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x10, 0x08, 0x00, 0xcc, 0xcc, 0xcc, 0xcc,	0xc8, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x30, 0xdf, 0xa6, 0xcb, 	0x4f, 0x7d, 0xc5, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x7f, 0xff, 0xff, 0xff, 0xff, 	0xff, 0xff, 0xff, 0x7f, 0xc0, 0x3c, 0x4e, 0x59, 0x62, 0x73, 0xc5, 0x01, 0xc0, 0x3c, 0x4e, 0x59,	0x62, 0x73, 0xc5, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x7f, 0x16, 0x00, 0x16, 0x00,	0x04, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x08, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00,	0x0c, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 	0x14, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x18, 0x00, 0x02, 0x00, 0x65, 0x00, 0x00, 0x00, 	0xed, 0x03, 0x00, 0x00, 0x04, 0x02, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x1c, 0x00, 0x02, 0x00,	0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x00, 0x00, 0x00, 0x00, 0x14, 0x00, 0x16, 0x00, 0x20, 0x00, 0x02, 0x00, 0x16, 0x00, 0x18, 0x00,	0x24, 0x00, 0x02, 0x00, 0x28, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x00, 0x21, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x01, 0x00, 0x00, 0x00, 0x2c, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x00, 0x00, 0x00, 0x00, 0x0b, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x0b, 0x00, 0x00, 0x00,	0x57, 0x00, 0x32, 0x00, 0x30, 0x00, 0x30, 0x00, 0x33, 0x00, 0x46, 0x00, 0x49, 0x00, 0x4e, 0x00,	0x41, 0x00, 0x4c, 0x00, 0x24, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x04, 0x02, 0x00, 0x00, 0x07, 0x00, 0x00, 0x00,	0x0b, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x0a, 0x00, 0x00, 0x00, 0x57, 0x00, 0x32, 0x00,	0x30, 0x00, 0x30, 0x00, 0x33, 0x00, 0x46, 0x00, 0x49, 0x00, 0x4e, 0x00, 0x41, 0x00, 0x4c, 0x00,	0x0c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x0b, 0x00, 0x00, 0x00, 0x57, 0x00, 0x49, 0x00,	0x4e, 0x00, 0x32, 0x00, 0x4b, 0x00, 0x33, 0x00, 0x54, 0x00, 0x48, 0x00, 0x49, 0x00, 0x4e, 0x00,	0x4b, 0x00, 0x00, 0x00, 0x04, 0x00, 0x00, 0x00, 0x01, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x05,	0x15, 0x00, 0x00, 0x00, 0x11, 0x2f, 0xaf, 0xb5, 0x90, 0x04, 0x1b, 0xec, 0x50, 0x3b, 0xec, 0xdc,	0x01, 0x00, 0x00, 0x00, 0x30, 0x00, 0x02, 0x00, 0x07, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00,	0x01, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x05, 0x09, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,	0x80, 0x66, 0x28, 0xea, 0x37, 0x80, 0xc5, 0x01, 0x16, 0x00, 0x77, 0x00, 0x32, 0x00, 0x30, 0x00,	0x30, 0x00, 0x33, 0x00, 0x66, 0x00, 0x69, 0x00, 0x6e, 0x00, 0x61, 0x00, 0x6c, 0x00, 0x24, 0x00,	0x76, 0xff, 0xff, 0xff, 0x37, 0xd5, 0xb0, 0xf7, 0x24, 0xf0, 0xd6, 0xd4, 0xec, 0x09, 0x86, 0x5a,	0xa0, 0xe8, 0xc3, 0xa9, 0x00, 0x00, 0x00, 0x00, 0x76, 0xff, 0xff, 0xff, 0xb4, 0xd8, 0xb8, 0xfe,	0x83, 0xb3, 0x13, 0x3f, 0xfc, 0x5c, 0x41, 0xad, 0xe2, 0x64, 0x83, 0xe0, 0x00, 0x00, 0x00, 0x00};/* Check with a known 'well formed' PAC, from my test server */static bool torture_pac_saved_check(struct torture_context *tctx){	NTSTATUS nt_status;	enum ndr_err_code ndr_err;	DATA_BLOB tmp_blob, validate_blob;	struct PAC_DATA *pac_data, pac_data2;	struct PAC_LOGON_INFO *logon_info;	union netr_Validation validation;	const char *pac_file, *pac_kdc_key, *pac_member_key;	struct auth_serversupplied_info *server_info_out;	krb5_keyblock server_keyblock;	krb5_keyblock krbtgt_keyblock;	struct samr_Password *krbtgt_bytes, *krbsrv_bytes;		krb5_error_code ret;	struct smb_krb5_context *smb_krb5_context;	const char *principal_string;	char *broken_principal_string;	krb5_principal client_principal;	const char *authtime_string;	time_t authtime;	TALLOC_CTX *mem_ctx = tctx;	torture_assert(tctx, 0 == smb_krb5_init_context(mem_ctx, NULL,							tctx->lp_ctx,							&smb_krb5_context),		       "smb_krb5_init_context");	pac_kdc_key = torture_setting_string(tctx, "pac_kdc_key", 					     "B286757148AF7FD252C53603A150B7E7");	pac_member_key = torture_setting_string(tctx, "pac_member_key", 						"D217FAEAE5E6B5F95CCC94077AB8A5FC");	torture_comment(tctx, "Using pac_kdc_key '%s'\n", pac_kdc_key);	torture_comment(tctx, "Using pac_member_key '%s'\n", pac_member_key);	/* The krbtgt key in use when the above PAC was generated.	 * This is an arcfour-hmac-md5 key, extracted with our 'net	 * samdump' tool. */	krbtgt_bytes = smbpasswd_gethexpwd(mem_ctx, pac_kdc_key);	if (!krbtgt_bytes) {		torture_fail(tctx, "(saved test) Could not interpret krbtgt key");	}	krbsrv_bytes = smbpasswd_gethexpwd(mem_ctx, pac_member_key);	if (!krbsrv_bytes) {		torture_fail(tctx, "(saved test) Could not interpret krbsrv key");	}	ret = krb5_keyblock_init(smb_krb5_context->krb5_context,				 ENCTYPE_ARCFOUR_HMAC,				 krbsrv_bytes->hash, sizeof(krbsrv_bytes->hash),				 &server_keyblock);	torture_assert(tctx, !ret,		       talloc_asprintf(tctx,				       "(saved test) Server Keyblock encoding failed: %s", 				       smb_get_krb5_error_message(smb_krb5_context->krb5_context, 								  ret, mem_ctx)));	ret = krb5_keyblock_init(smb_krb5_context->krb5_context,				 ENCTYPE_ARCFOUR_HMAC,				 krbtgt_bytes->hash, sizeof(krbtgt_bytes->hash),				 &krbtgt_keyblock);	if (ret) {		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, 					    &server_keyblock);

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久国产尿小便嘘嘘| 精品视频一区二区不卡| 欧美最新大片在线看| 精品国精品自拍自在线| 亚洲人成精品久久久久| 国产麻豆精品theporn| 欧美日韩不卡视频| 中文字幕一区二区日韩精品绯色| 蜜桃精品视频在线观看| 在线精品亚洲一区二区不卡| 国产欧美一区二区三区在线老狼 | 三级久久三级久久久| av在线不卡电影| 久久综合久久综合久久综合| 日韩激情视频在线观看| 91亚洲精品久久久蜜桃网站| 久久久久久黄色| 久久99国产乱子伦精品免费| 欧美巨大另类极品videosbest | 中文字幕高清不卡| 色吊一区二区三区| 中文字幕在线观看一区| 高清成人免费视频| 久久久高清一区二区三区| 久久99精品视频| 欧美成人官网二区| 日本女人一区二区三区| 欧美一区二区大片| 蜜桃视频一区二区三区| 欧美zozozo| 国产精品一二三四五| 亚洲精品一区二区三区精华液 | 日本欧洲一区二区| 日韩三级在线免费观看| 五月天丁香久久| 欧美人狂配大交3d怪物一区| 亚洲国产wwwccc36天堂| 欧美日韩午夜精品| 亚洲成a人v欧美综合天堂| 欧美浪妇xxxx高跟鞋交| 日韩综合在线视频| 欧美成人欧美edvon| 国产乱人伦偷精品视频免下载 | 粉嫩aⅴ一区二区三区四区 | 欧美不卡激情三级在线观看| 国内成人精品2018免费看| 久久久久久久久久久电影| 国产精品一区三区| 日本一区二区成人在线| 制服丝袜亚洲网站| 麻豆国产精品官网| 国产亚洲视频系列| 91在线视频免费91| 亚洲一级二级在线| 日韩免费在线观看| 波多野结衣在线一区| 亚洲综合无码一区二区| 日韩亚洲电影在线| 成人小视频免费观看| 亚洲一区二区三区四区的| 日韩午夜精品视频| 99re这里只有精品首页| 日韩黄色小视频| 中文字幕的久久| 欧美天堂一区二区三区| 久久精品国产色蜜蜜麻豆| 国产精品另类一区| 6080日韩午夜伦伦午夜伦| 国产高清在线精品| 一区二区三区欧美日| 精品99久久久久久| 在线亚洲欧美专区二区| 国内一区二区在线| 亚洲午夜精品一区二区三区他趣| 日韩免费在线观看| 欧美在线一二三四区| 国产乱理伦片在线观看夜一区| 亚洲色图制服诱惑| 久久亚洲影视婷婷| 欧美精品粉嫩高潮一区二区| 国产成人精品在线看| 日韩高清在线观看| 亚洲精品日韩专区silk| 国产亚洲污的网站| 欧美一级艳片视频免费观看| 一本大道av伊人久久综合| 国产一区二区在线影院| 午夜久久久久久电影| 中文字幕欧美一区| 久久久久久久久免费| 欧美日韩高清一区二区三区| 成人一区二区三区在线观看| 日本午夜一区二区| 亚洲最大的成人av| 国产精品大尺度| 久久综合久久综合九色| 日韩视频永久免费| 欧美日韩精品免费| 欧美亚洲高清一区二区三区不卡| 成人高清视频在线观看| 韩国毛片一区二区三区| 免费人成网站在线观看欧美高清| 一区二区成人在线| 日韩码欧中文字| 国产精品人成在线观看免费| 久久综合色8888| 久久九九影视网| 精品少妇一区二区三区| 欧美电影影音先锋| 7777女厕盗摄久久久| 欧美视频一区二区三区在线观看 | 欧美高清视频在线高清观看mv色露露十八| 不卡欧美aaaaa| bt7086福利一区国产| 99久久er热在这里只有精品66| 成人午夜在线免费| 91色综合久久久久婷婷| 99久久免费视频.com| 一本色道亚洲精品aⅴ| 色婷婷综合激情| 欧美日韩久久久一区| 91精品久久久久久久久99蜜臂| 欧美电影影音先锋| 日韩欧美电影一区| 久久一夜天堂av一区二区三区| 久久综合资源网| 国产精品乱人伦一区二区| 亚洲欧美色一区| 午夜视频一区二区| 久草热8精品视频在线观看| 韩国v欧美v亚洲v日本v| 成人免费看视频| 欧美综合视频在线观看| 正在播放亚洲一区| 久久久久久久免费视频了| 国产精品天美传媒沈樵| 亚洲精品视频在线看| 视频一区视频二区中文| 国精品**一区二区三区在线蜜桃| 国产成人三级在线观看| 91国偷自产一区二区使用方法| 欧美三级欧美一级| 日韩你懂的在线播放| 国产精品久久久久久久久搜平片| 一区二区三区在线观看动漫| 日本va欧美va精品发布| 国产91在线|亚洲| 欧美亚洲综合久久| 国产日韩精品一区二区三区| 亚洲综合在线观看视频| 免费观看在线色综合| 丁香另类激情小说| 欧美高清视频一二三区 | 国产精品一区一区三区| 色哟哟国产精品免费观看| 日韩一区二区在线观看| 中文一区在线播放| 日韩高清不卡一区二区三区| 岛国一区二区三区| 欧美日韩精品欧美日韩精品| 欧美韩国日本不卡| 日韩精品一级二级| 99久久亚洲一区二区三区青草| 7799精品视频| 成人免费在线观看入口| 狠狠久久亚洲欧美| 欧美影院精品一区| 国产精品天美传媒| 麻豆国产欧美日韩综合精品二区| 91色porny蝌蚪| 久久久国产一区二区三区四区小说 | 亚洲国产色一区| 高清不卡一区二区在线| 91精品婷婷国产综合久久| 一区二区理论电影在线观看| 国产成人精品一区二区三区网站观看| 7777精品伊人久久久大香线蕉超级流畅 | 五月天久久比比资源色| 99国产一区二区三精品乱码| 久久理论电影网| 久久国产精品99久久久久久老狼| 在线观看成人免费视频| 1区2区3区国产精品| 国产精品2024| 亚洲精品在线免费播放| 日本va欧美va精品发布| 欧美网站大全在线观看| 国产精品国产自产拍高清av王其| 国产一区二区0| 久久九九99视频| 国产一区二区在线视频| 久久午夜免费电影| 国产酒店精品激情| 久久久久久久久97黄色工厂| 精品一区二区影视| www激情久久| 国产99久久久久| 国产欧美精品在线观看| 成人综合在线视频| 亚洲欧美在线aaa|