亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? connect.c

?? r73模塊的無線網卡在Linux下的驅動程序
?? C
?? 第 1 頁 / 共 4 頁
字號:
/*************************************************************************** * RT2x00 SourceForge Project - http://rt2x00.serialmonkey.com             * *                                                                         * *   This program is free software; you can redistribute it and/or modify  * *   it under the terms of the GNU General Public License as published by  * *   the Free Software Foundation; either version 2 of the License, or     * *   (at your option) any later version.                                   * *                                                                         * *   This program is distributed in the hope that it will be useful,       * *   but WITHOUT ANY WARRANTY; without even the implied warranty of        * *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the         * *   GNU General Public License for more details.                          * *                                                                         * *   You should have received a copy of the GNU General Public License     * *   along with this program; if not, write to the                         * *   Free Software Foundation, Inc.,                                       * *   59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.             * *                                                                         * *   Licensed under the GNU GPL                                            * *   Original code supplied under license from RaLink Inc, 2004.           * ***************************************************************************//*************************************************************************** *	Module Name:	connect.c * *	Abstract: * *	Revision History: *	Who		When		What *	--------	----------	----------------------------- *	Name		Date		Modification logs *	John		2004-08-08	Major modification from RT2560 * ***************************************************************************/#include "rt_config.h"UCHAR	CipherSuiteWpaNoneTkip[] = {		0x00, 0x50, 0xf2, 0x01,	// oui		0x01, 0x00,				// Version		0x00, 0x50, 0xf2, 0x02,	// Multicast		0x01, 0x00,				// Number of unicast		0x00, 0x50, 0xf2, 0x02,	// unicast		0x01, 0x00,				// number of authentication method		0x00, 0x50, 0xf2, 0x00	// authentication		};UCHAR	CipherSuiteWpaNoneTkipLen = (sizeof(CipherSuiteWpaNoneTkip) / sizeof(UCHAR));UCHAR	CipherSuiteWpaNoneAes[] = {		0x00, 0x50, 0xf2, 0x01,	// oui		0x01, 0x00,				// Version		0x00, 0x50, 0xf2, 0x04,	// Multicast		0x01, 0x00,				// Number of unicast		0x00, 0x50, 0xf2, 0x04,	// unicast		0x01, 0x00,				// number of authentication method		0x00, 0x50, 0xf2, 0x00	// authentication		};UCHAR	CipherSuiteWpaNoneAesLen = (sizeof(CipherSuiteWpaNoneAes) / sizeof(UCHAR));// The following MACRO is called after 1. starting an new IBSS, 2. succesfully JOIN an IBSS,// or 3. succesfully ASSOCIATE to a BSS, 4. successfully RE_ASSOCIATE to a BSS// All settings successfuly negotiated furing MLME state machines become final settings// and are copied to pAd->ActiveCfg#define COPY_SETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(_pAd) 								\{																						\	_pAd->PortCfg.SsidLen = _pAd->MlmeAux.SsidLen;									  \	memcpy(_pAd->PortCfg.Ssid, _pAd->MlmeAux.Ssid, _pAd->MlmeAux.SsidLen);	  \	COPY_MAC_ADDR(_pAd->PortCfg.Bssid, _pAd->MlmeAux.Bssid);						  \	_pAd->PortCfg.Channel = _pAd->MlmeAux.Channel;									  \	_pAd->ActiveCfg.Aid = _pAd->MlmeAux.Aid;											\	_pAd->ActiveCfg.AtimWin = _pAd->MlmeAux.AtimWin;									\	_pAd->ActiveCfg.CapabilityInfo = _pAd->MlmeAux.CapabilityInfo;						\	_pAd->PortCfg.BeaconPeriod = _pAd->MlmeAux.BeaconPeriod;						  \	_pAd->ActiveCfg.CfpMaxDuration = _pAd->MlmeAux.CfpMaxDuration;						\	_pAd->ActiveCfg.CfpPeriod = _pAd->MlmeAux.CfpPeriod;								\	_pAd->ActiveCfg.SupRateLen = _pAd->MlmeAux.SupRateLen;								\	memcpy(_pAd->ActiveCfg.SupRate, _pAd->MlmeAux.SupRate, _pAd->MlmeAux.SupRateLen);	\	_pAd->ActiveCfg.ExtRateLen = _pAd->MlmeAux.ExtRateLen;										\	memcpy(_pAd->ActiveCfg.ExtRate, _pAd->MlmeAux.ExtRate, _pAd->MlmeAux.ExtRateLen);	\	memcpy(&_pAd->PortCfg.APEdcaParm, &_pAd->MlmeAux.APEdcaParm, sizeof(EDCA_PARM));  \	memcpy(&_pAd->PortCfg.APQosCapability, &_pAd->MlmeAux.APQosCapability, sizeof(QOS_CAPABILITY_PARM));  \	memcpy(&_pAd->PortCfg.APQbssLoad, &_pAd->MlmeAux.APQbssLoad, sizeof(QBSS_LOAD_PARM)); \}/*	==========================================================================	Description:	==========================================================================*/VOID MlmeCntlInit(	IN PRTMP_ADAPTER pAd,	IN STATE_MACHINE *S,	OUT STATE_MACHINE_FUNC Trans[]){	// Control state machine differs from other state machines, the interface	// follows the standard interface	pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;}/*	==========================================================================	Description:	==========================================================================*/VOID MlmeCntlMachinePerformAction(	IN PRTMP_ADAPTER pAd,	IN STATE_MACHINE *S,	IN MLME_QUEUE_ELEM *Elem){	switch(pAd->Mlme.CntlMachine.CurrState)	{		case CNTL_IDLE:			CntlIdleProc(pAd, Elem);			break;		case CNTL_WAIT_DISASSOC:			CntlWaitDisassocProc(pAd, Elem);			break;		case CNTL_WAIT_JOIN:			CntlWaitJoinProc(pAd, Elem);			break;		// CNTL_WAIT_REASSOC is the only state in CNTL machine that does		// not triggered directly or indirectly by "RTMPSetInformation(OID_xxx)".		// Therefore not protected by NDIS's "only one outstanding OID request"		// rule. Which means NDIS may SET OID in the middle of ROAMing attempts.		// Current approach is to block new SET request at RTMPSetInformation()		// when CntlMachine.CurrState is not CNTL_IDLE		case CNTL_WAIT_REASSOC:			CntlWaitReassocProc(pAd, Elem);			break;		case CNTL_WAIT_START:			CntlWaitStartProc(pAd, Elem);			break;		case CNTL_WAIT_AUTH:			CntlWaitAuthProc(pAd, Elem);			break;		case CNTL_WAIT_AUTH2:			CntlWaitAuthProc2(pAd, Elem);			break;		case CNTL_WAIT_ASSOC:			CntlWaitAssocProc(pAd, Elem);			break;		case CNTL_WAIT_OID_LIST_SCAN:			if(Elem->MsgType == MT2_SCAN_CONF)			{				// Resume TxRing after SCANING complete. We hope the out-of-service time				// won't be too long to let upper layer time-out the waiting frames				RTUSBResumeMsduTransmission(pAd);				pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;			}			break;		case CNTL_WAIT_OID_DISASSOC:			if (Elem->MsgType == MT2_DISASSOC_CONF)			{				DBGPRINT(RT_DEBUG_TRACE,						"LinkDown(MlmeCntlMachinePerformAction)\n");				// maybe wait for the disassoc frame to hit the air.				RTUSBwaitTxDone(pAd);				LinkDown(pAd, FALSE);				pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;			}			break;		default:			DBGPRINT_ERR("!ERROR! CNTL - Illegal message type(=%d)", Elem->MsgType);			break;	}}/*	==========================================================================	Description:	==========================================================================*/VOID CntlIdleProc(	IN PRTMP_ADAPTER pAd,	IN MLME_QUEUE_ELEM *Elem){	MLME_DISASSOC_REQ_STRUCT   DisassocReq;	if (RTMP_TEST_FLAG(pAd, fRTMP_ADAPTER_RADIO_OFF))	{		if (pAd->MlmeAux.CurrReqIsFromNdis)			pAd->MlmeAux.CurrReqIsFromNdis = FALSE;		return;	}	switch(Elem->MsgType)	{		case OID_802_11_SSID:			CntlOidSsidProc(pAd, Elem);			break;		case OID_802_11_BSSID:			CntlOidRTBssidProc(pAd,Elem);			break;		case OID_802_11_BSSID_LIST_SCAN:			CntlOidScanProc(pAd,Elem);			break;		case OID_802_11_DISASSOCIATE:			DisassocParmFill(pAd, &DisassocReq, pAd->PortCfg.Bssid, REASON_DISASSOC_STA_LEAVING);			MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,						sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);			pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_DISASSOC;			// Set the AutoReconnectSsid to prevent it reconnect to old SSID			// Since calling this indicate user don't want to connect to that			// SSID anymore.			pAd->MlmeAux.AutoReconnectSsidLen= 32;			memset(pAd->MlmeAux.AutoReconnectSsid, 0, pAd->MlmeAux.AutoReconnectSsidLen);			break;		case MT2_MLME_ROAMING_REQ:			CntlMlmeRoamingProc(pAd, Elem);			break;		default:			DBGPRINT(RT_DEBUG_TRACE, "CNTL - Illegal message in CntlIdleProc(MsgType=%d)\n",Elem->MsgType);			break;	}}VOID CntlOidScanProc(	IN PRTMP_ADAPTER pAd,	IN MLME_QUEUE_ELEM *Elem){	MLME_SCAN_REQ_STRUCT	   ScanReq;	ULONG					   BssIdx = BSS_NOT_FOUND;	BSS_ENTRY				   CurrBss;	DBGPRINT(RT_DEBUG_INFO, "CNTL - SCAN starts\n");	// record current BSS if network is connected.	// 2003-2-13 do not include current IBSS if this is the only STA in this IBSS.	if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED))	{		BssIdx = BssSsidTableSearch(&pAd->ScanTab, pAd->PortCfg.Bssid, pAd->PortCfg.Ssid, pAd->PortCfg.SsidLen, pAd->PortCfg.Channel);		if (BssIdx != BSS_NOT_FOUND)		{			memcpy(&CurrBss, &pAd->ScanTab.BssEntry[BssIdx], sizeof(BSS_ENTRY));			// 2003-2-20 reset this RSSI to a low value but not zero. In normal case, the coming SCAN			//	   should return a correct RSSI to overwrite this. If no BEEACON received after SCAN,			//	   at least we still report a "greater than 0" RSSI since we claim it's CONNECTED.			//CurrBss.Rssi = pAd->BbpRssiToDbmDelta - 85; // assume -85 dB		}	}	// clean up previous SCAN result, add current BSS back to table if any	BssTableInit(&pAd->ScanTab);	if (BssIdx != BSS_NOT_FOUND)	{		// DDK Note: If the NIC is associated with a particular BSSID and SSID		//	  that are not contained in the list of BSSIDs generated by this scan, the		//	  BSSID description of the currently associated BSSID and SSID should be		//	  appended to the list of BSSIDs in the NIC's database.		// To ensure this, we append this BSS as the first entry in SCAN result		memcpy(&pAd->ScanTab.BssEntry[0], &CurrBss, sizeof(BSS_ENTRY));		pAd->ScanTab.BssNr = 1;	}	ScanParmFill(pAd, &ScanReq, "", 0, BSS_ANY, SCAN_PASSIVE);	MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_SCAN_REQ,				sizeof(MLME_SCAN_REQ_STRUCT), &ScanReq);	pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_LIST_SCAN;}/*	==========================================================================	Description:		Before calling this routine, user desired SSID should already been		recorded in PortCfg.Ssid[]	==========================================================================*/VOID CntlOidSsidProc(	IN PRTMP_ADAPTER pAd,	IN MLME_QUEUE_ELEM * Elem){    PNDIS_802_11_SSID		   pOidSsid = (NDIS_802_11_SSID *)Elem->Msg;	MLME_DISASSOC_REQ_STRUCT   DisassocReq;	ULONG					   Now;	// Step 1. record the desired user settings to MlmeAux	memcpy(pAd->MlmeAux.Ssid, pOidSsid->Ssid, pOidSsid->SsidLength);	pAd->MlmeAux.SsidLen = (UCHAR)pOidSsid->SsidLength;	memset(pAd->MlmeAux.Bssid, 0, MAC_ADDR_LEN);	pAd->MlmeAux.BssType = pAd->PortCfg.BssType;	//	// Update Reconnect Ssid, that user desired to connect.	//	memcpy(pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);	pAd->MlmeAux.AutoReconnectSsidLen = pAd->MlmeAux.SsidLen;	// step 2. find all matching BSS in the lastest SCAN result (inBssTab)	//	  & log them into MlmeAux.SsidBssTab for later-on iteration. Sort by RSSI order	BssTableSsidSort(pAd, &pAd->MlmeAux.SsidBssTab, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);	DBGPRINT(RT_DEBUG_TRACE, "CNTL - %d BSS match the desire SSID - %s\n",pAd->MlmeAux.SsidBssTab.BssNr, pAd->MlmeAux.Ssid);	Now = jiffies;	if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED) &&		(pAd->PortCfg.SsidLen == pAd->MlmeAux.SsidBssTab.BssEntry[0].SsidLen) &&		NdisEqualMemory(pAd->PortCfg.Ssid, pAd->MlmeAux.SsidBssTab.BssEntry[0].Ssid, pAd->PortCfg.SsidLen) &&		MAC_ADDR_EQUAL(pAd->PortCfg.Bssid, pAd->MlmeAux.SsidBssTab.BssEntry[0].Bssid))	{		// Case 1. already connected with an AP who has the desired SSID		//		   with highest RSSI		if (((pAd->PortCfg.AuthMode == Ndis802_11AuthModeWPA)	 ||			 (pAd->PortCfg.AuthMode == Ndis802_11AuthModeWPAPSK) ||			 (pAd->PortCfg.AuthMode == Ndis802_11AuthModeWPA2)	 ||			 (pAd->PortCfg.AuthMode == Ndis802_11AuthModeWPA2PSK)#if WPA_SUPPLICANT_SUPPORT			  || (pAd->PortCfg.IEEE8021X == TRUE)#endif			 )  &&			 (pAd->PortCfg.PortSecured == WPA_802_1X_PORT_NOT_SECURED))		{			// case 1.1 For WPA, WPA-PSK, if the 1x port is not secured, we have to redo			//			connection process			DBGPRINT(RT_DEBUG_TRACE, "CNTL - disassociate with current AP...\n");			DisassocParmFill(pAd, &DisassocReq, pAd->PortCfg.Bssid, REASON_DISASSOC_STA_LEAVING);			MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,						sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);			pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;		}		else if (pAd->bConfigChanged == TRUE)		{			// case 1.2 Important Config has changed, we have to reconnect to the same AP			DBGPRINT(RT_DEBUG_TRACE, "CNTL - disassociate with current AP Because config changed...\n");			DisassocParmFill(pAd, &DisassocReq, pAd->PortCfg.Bssid, REASON_DISASSOC_STA_LEAVING);			MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,						sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);			pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;		}		else		{			// case 1.3. already connected to the SSID with highest RSSI.			DBGPRINT(RT_DEBUG_TRACE, "CNTL - already with this BSSID. ignore this SET_SSID request\n");			// We only check if same to the BSSID with highest RSSI.			// If roaming of same SSID required, we still do the reconnection.			// same BSSID, go back to idle state directly			if (pAd->MlmeAux.CurrReqIsFromNdis)			{			}			pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;		}	}	else if (INFRA_ON(pAd))	{		// case 2. active INFRA association existent		//	  roaming is done within miniport driver, nothing to do with configuration		//	  utility. so upon a new SET(OID_802_11_SSID) is received, we just		//	  disassociate with the current associated AP,		//	  then perform a new association with this new SSID, no matter the		//	  new/old SSID are the same or not.		DBGPRINT(RT_DEBUG_TRACE, "CNTL - disassociate with current AP...\n");		DisassocParmFill(pAd, &DisassocReq, pAd->PortCfg.Bssid, REASON_DISASSOC_STA_LEAVING);		MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,					sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);		pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;	}	else	{		if (ADHOC_ON(pAd))		{			DBGPRINT(RT_DEBUG_TRACE, "CNTL - drop current ADHOC\n");			LinkDown(pAd, FALSE);			OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);			DBGPRINT(RT_DEBUG_TRACE, "NDIS_STATUS_MEDIA_DISCONNECT Event C!\n");		}		if ((pAd->MlmeAux.SsidBssTab.BssNr == 0) &&			(pAd->PortCfg.bAutoReconnect == TRUE) &&			(pAd->MlmeAux.BssType == BSS_INFRA) &&			(MlmeValidateSSID(pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen) == TRUE))		{			MLME_SCAN_REQ_STRUCT	   ScanReq;			DBGPRINT(RT_DEBUG_TRACE, "CNTL - No matching BSS, start a new scan\n");			ScanParmFill(pAd, &ScanReq, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen, BSS_ANY, SCAN_ACTIVE);			MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_SCAN_REQ,						sizeof(MLME_SCAN_REQ_STRUCT), &ScanReq);			pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_LIST_SCAN;			// Reset Missed scan number			pAd->PortCfg.LastScanTime = Now;		}		else

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧洲日韩一区二区三区| 99精品热视频| 99re热视频精品| 91精品综合久久久久久| 国产精品久久久久aaaa樱花| 日韩影视精彩在线| 色婷婷精品大在线视频| 精品播放一区二区| 日韩av一级电影| 91成人国产精品| 国产精品美女久久久久aⅴ国产馆 国产精品美女久久久久av爽李琼 国产精品美女久久久久高潮 | 欧美成人一区二区三区片免费 | 欧美日本韩国一区二区三区视频| 日本一区二区三区在线不卡| 日韩av成人高清| 欧美亚洲一区二区在线观看| 国产精品九色蝌蚪自拍| 丁香激情综合五月| 精品久久久久99| 欧美a一区二区| 欧洲激情一区二区| 亚洲欧美在线aaa| 成人高清免费在线播放| 久久人人爽爽爽人久久久| 成人性视频免费网站| 欧美成人一区二区三区片免费 | 日韩欧美一级二级| 在线免费观看成人短视频| 欧美日韩精品免费| 久久久久99精品一区| 亚洲日穴在线视频| 日本欧美一区二区三区乱码| 国产精品1区二区.| 欧美视频在线一区二区三区 | 精品国产三级电影在线观看| 国产精品免费视频网站| 亚洲一区二区三区视频在线播放| 久久精品国产一区二区| av电影在线不卡| 欧美r级电影在线观看| 中文字幕一区二区三区在线播放| 视频一区视频二区中文字幕| 国产91精品免费| 欧美一区午夜精品| 亚洲视频免费在线| 国产一区中文字幕| 欧美欧美午夜aⅴ在线观看| 国产视频视频一区| 蜜桃久久av一区| 91日韩在线专区| 欧美国产成人精品| 麻豆精品新av中文字幕| 日本伦理一区二区| 中文字幕不卡在线播放| 麻豆久久一区二区| 欧美日韩国产大片| 一区二区三区在线视频观看| 国产成人免费视频网站 | 欧美日韩一级视频| 中文字幕一区不卡| 国产不卡在线播放| 久久蜜臀精品av| 精品一区二区三区免费观看| 91精品欧美综合在线观看最新| 亚洲人成网站影音先锋播放| 丰满放荡岳乱妇91ww| 精品国产sm最大网站免费看| 日韩精品欧美成人高清一区二区| 在线免费亚洲电影| 一区二区三区四区视频精品免费| 91视频国产观看| 亚洲精品国产a久久久久久 | 午夜一区二区三区在线观看| 97超碰欧美中文字幕| 中文字幕中文在线不卡住| 国产乱人伦偷精品视频免下载| 欧美xxxx老人做受| 国产一区在线精品| 国产色91在线| 99久久久久久| 亚洲精品伦理在线| 精品视频资源站| 亚洲福利一区二区| 欧美日韩免费观看一区三区| 亚洲在线视频免费观看| 欧美日韩亚洲综合在线 欧美亚洲特黄一级 | 91精品欧美一区二区三区综合在 | 91麻豆精品国产91久久久 | 成人高清在线视频| 日韩伦理免费电影| 91福利小视频| 亚洲va欧美va人人爽午夜 | 欧美国产成人在线| 色综合天天做天天爱| 一卡二卡三卡日韩欧美| 欧美日韩国产成人在线91| 蜜臀精品久久久久久蜜臀| 久久综合五月天婷婷伊人| 国产福利一区二区三区| 亚洲色图在线视频| 91精品国产综合久久精品图片| 久久精品国产亚洲高清剧情介绍| 国产无人区一区二区三区| 91污片在线观看| 日韩va亚洲va欧美va久久| 精品成人免费观看| 91久久精品一区二区| 日韩影院精彩在线| 国产精品女上位| 欧美一区二区视频观看视频| 国产一区二区h| 一区二区在线观看不卡| 日韩欧美的一区| 91视频xxxx| 国产在线播精品第三| 一区二区三区四区亚洲| 国产三级一区二区| 欧美久久久一区| 成人免费视频一区二区| 亚洲福利视频三区| 中文字幕一区二区三区四区不卡 | 国产精品丝袜在线| 欧美乱熟臀69xxxxxx| 国产精品一区2区| 亚洲国产欧美一区二区三区丁香婷| 欧美大片免费久久精品三p| 一本久久精品一区二区| 精彩视频一区二区三区| 夜夜嗨av一区二区三区四季av| 久久久噜噜噜久久人人看| 欧美日韩一区三区| www.日韩在线| 国产真实乱对白精彩久久| 亚洲一区二区三区精品在线| 国产精品久久久久久亚洲伦| 欧美大白屁股肥臀xxxxxx| 欧美美女视频在线观看| 色av综合在线| 成人av在线一区二区三区| 国产综合成人久久大片91| 午夜av一区二区| 亚洲成av人片一区二区梦乃| 中文字幕欧美一区| 亚洲国产高清在线| 日本一区二区三区四区在线视频| 精品久久久久香蕉网| 欧美一区二区三区在线观看| 欧美一区二区精品在线| 欧美日韩和欧美的一区二区| 在线亚洲人成电影网站色www| 波多野结衣中文字幕一区二区三区| 国产麻豆精品在线| 国内不卡的二区三区中文字幕| 日本在线观看不卡视频| 日韩av电影免费观看高清完整版 | 欧美视频在线播放| 欧美日韩一区二区三区四区 | 欧美精品v国产精品v日韩精品 | 成人网在线免费视频| 国产精品系列在线观看| 国产精品18久久久久久vr| 国产成人日日夜夜| 成人av免费在线观看| 成人av免费在线播放| 91福利精品视频| 欧美日本国产一区| 久久香蕉国产线看观看99| 久久久久久黄色| 亚洲欧洲99久久| 亚洲成人av中文| 麻豆91精品91久久久的内涵| 国产精品一区一区三区| 成人av网站在线观看免费| 色综合天天综合色综合av| 欧美最猛黑人xxxxx猛交| 欧美一区二区三区影视| 欧美videos中文字幕| 国产欧美一区二区精品忘忧草| 亚洲欧洲色图综合| 日韩激情av在线| 国产成人亚洲综合a∨猫咪| 色综合天天综合色综合av| 日韩视频一区二区三区在线播放| 亚洲精品在线一区二区| 最新成人av在线| 日本中文字幕不卡| 99麻豆久久久国产精品免费| 欧美日韩aaa| 国产亚洲精品资源在线26u| 一区二区三区毛片| 国产一区二区在线观看视频| 99精品欧美一区二区三区综合在线| 欧美精品久久久久久久久老牛影院| 国产欧美一区二区三区在线看蜜臀| 亚洲韩国精品一区| 成人深夜视频在线观看| 日韩欧美专区在线| 亚洲综合色噜噜狠狠| 国产精品自拍在线| 欧美挠脚心视频网站|