日韩av黄I国产麻豆传媒I国产91av视频在线观看I日韩一区二区三区在线看I美女国产在线I麻豆视频国产在线观看I成人黄色短片

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 >

spring security oauth2 架构---官方

發布時間:2025/4/5 49 豆豆
生活随笔 收集整理的這篇文章主要介紹了 spring security oauth2 架构---官方 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

原文地址:https://projects.spring.io/spring-security-oauth/docs/oauth2.html

Introduction

This is the user guide for the support for?OAuth 2.0. For OAuth 1.0, everything is different, so?see its user guide.

This user guide is divided into two parts, the first for the OAuth 2.0 provider, the second for the OAuth 2.0 client. For both the provider and the client, the best source of sample code is the?integration tests?and?sample apps.

OAuth 2.0 Provider

The OAuth 2.0 provider mechanism is responsible for exposing OAuth 2.0 protected resources. The configuration involves establishing the OAuth 2.0 clients that can access its protected resources independently or on behalf of a user. The provider does this by managing and verifying the OAuth 2.0 tokens used to access the protected resources. Where applicable, the provider must also supply an interface for the user to confirm that a client can be granted access to the protected resources (i.e. a confirmation page).

OAuth 2.0 Provider Implementation

The provider role in OAuth 2.0 is actually split between Authorization Service and Resource Service, and while these sometimes reside in the same application, with Spring Security OAuth you have the option to split them across two applications, and also to have multiple Resource Services that share an Authorization Service. The requests for the tokens are handled by Spring MVC controller endpoints, and access to protected resources is handled by standard Spring Security request filters. The following endpoints are required in the Spring Security filter chain in order to implement OAuth 2.0 Authorization Server:

  • AuthorizationEndpoint?is used to service requests for authorization. Default URL:?/oauth/authorize.
  • TokenEndpoint?is used to service requests for access tokens. Default URL:?/oauth/token.

The following filter is required to implement an OAuth 2.0 Resource Server:

  • The?OAuth2AuthenticationProcessingFilter?is used to load the Authentication for the request given an authenticated access token.

For all the OAuth 2.0 provider features, configuration is simplified using special Spring OAuth?@Configuration?adapters. There is also an XML namespace for OAuth configuration, and the schema resides at?http://www.springframework.org/schema/security/spring-security-oauth2.xsd. The namespace is?http://www.springframework.org/schema/security/oauth2.

Authorization Server Configuration

As you configure the Authorization Server, you have to consider the grant type that the client is to use to obtain an access token from the end-user (e.g. authorization code, user credentials, refresh token). The configuration of the server is used to provide implementations of the client details service and token services and to enable or disable certain aspects of the mechanism globally. Note, however, that each client can be configured specifically with permissions to be able to use certain authorization mechanisms and access grants. I.e. just because your provider is configured to support the "client credentials" grant type, doesn't mean that a specific client is authorized to use that grant type.

The?@EnableAuthorizationServer?annotation is used to configure the OAuth 2.0 Authorization Server mechanism, together with any?@Beans?that implement?AuthorizationServerConfigurer?(there is a handy adapter implementation with empty methods). The following features are delegated to separate configurers that are created by Spring and passed into the?AuthorizationServerConfigurer:

  • ClientDetailsServiceConfigurer: a configurer that defines the client details service. Client details can be initialized, or you can just refer to an existing store.
  • AuthorizationServerSecurityConfigurer: defines the security constraints on the token endpoint.
  • AuthorizationServerEndpointsConfigurer: defines the authorization and token endpoints and the token services.

An important aspect of the provider configuration is the way that an authorization code is supplied to an OAuth client (in the authorization code grant). A authorization code is obtained by the OAuth client by directing the end-user to an authorization page where the user can enter her credentials, resulting in a redirection from the provider authorization server back to the OAuth client with the authorization code. Examples of this are elaborated in the OAuth 2 specification.

In XML there is an?<authorization-server/>?element that is used in a similar way to configure the OAuth 2.0 Authorization Server.

Configuring Client Details

The?ClientDetailsServiceConfigurer?(a callback from your?AuthorizationServerConfigurer) can be used to define an in-memory or JDBC implementation of the client details service. Important attributes of a client are

  • clientId: (required) the client id.
  • secret: (required for trusted clients) the client secret, if any.
  • scope: The scope to which the client is limited. If scope is undefined or empty (the default) the client is not limited by scope.
  • authorizedGrantTypes: Grant types that are authorized for the client to use. Default value is empty.
  • authorities: Authorities that are granted to the client (regular Spring Security authorities).

Client details can be updated in a running application by access the underlying store directly (e.g. database tables in the case of?JdbcClientDetailsService) or through the?ClientDetailsManager?interface (which both implementations of?ClientDetailsService?also implement).

NOTE: the schema for the JDBC service is not packaged with the library (because there are too many variations you might like to use in practice), but there is an example you can start from in the?test code in github.

Managing Tokens

The?AuthorizationServerTokenServices?interface defines the operations that are necessary to manage OAuth 2.0 tokens. Note the following:

  • When an access token is created, the authentication must be stored so that resources accepting the access token can reference it later.
  • The access token is used to load the authentication that was used to authorize its creation.

When creating your?AuthorizationServerTokenServices?implementation, you may want to consider using the?DefaultTokenServices?which has many strategies that can be plugged in to change the format and storage of access tokens. By default it creates tokens via random value and handles everything except for the persistence of the tokens which it delegates to a?TokenStore. The default store is an?in-memory implementation, but there are some other implementations available. Here's a description with some discussion of each of them

  • The default?InMemoryTokenStore?is perfectly fine for a single server (i.e. low traffic and no hot swap to a backup server in the case of failure). Most projects can start here, and maybe operate this way in development mode, to make it easy to start a server with no dependencies.

  • The?JdbcTokenStore?is the?JDBC version?of the same thing, which stores token data in a relational database. Use the JDBC version if you can share a database between servers, either scaled up instances of the same server if there is only one, or the Authorization and Resources Servers if there are multiple components. To use the?JdbcTokenStore?you need "spring-jdbc" on the classpath.

  • The?JSON Web Token (JWT) version?of the store encodes all the data about the grant into the token itself (so no back end store at all which is a significant advantage). One disadvantage is that you can't easily revoke an access token, so they normally are granted with short expiry and the revocation is handled at the refresh token. Another disadvantage is that the tokens can get quite large if you are storing a lot of user credential information in them. The?JwtTokenStore?is not really a "store" in the sense that it doesn't persist any data, but it plays the same role of translating betweeen token values and authentication information in the?DefaultTokenServices.

NOTE: the schema for the JDBC service is not packaged with the library (because there are too many variations you might like to use in practice), but there is an example you can start from in the?test code in github. Be sure to?@EnableTransactionManagement?to prevent clashes between client apps competing for the same rows when tokens are created. Note also that the sample schema has explicit?PRIMARY KEY?declarations - these are also necessary in a concurrent environment.

JWT Tokens

To use JWT tokens you need a?JwtTokenStore?in your Authorization Server. The Resource Server also needs to be able to decode the tokens so the?JwtTokenStore?has a dependency on a?JwtAccessTokenConverter, and the same implementation is needed by both the Authorization Server and the Resource Server. The tokens are signed by default, and the Resource Server also has to be able to verify the signature, so it either needs the same symmetric (signing) key as the Authorization Server (shared secret, or symmetric key), or it needs the public key (verifier key) that matches the private key (signing key) in the Authorization Server (public-private or asymmetric key). The public key (if available) is exposed by the Authorization Server on the?/oauth/token_key?endpoint, which is secure by default with access rule "denyAll()". You can open it up by injecting a standard SpEL expression into the?AuthorizationServerSecurityConfigurer?(e.g. "permitAll()" is probably adequate since it is a public key).

To use the?JwtTokenStore?you need "spring-security-jwt" on your classpath (you can find it in the same github repository as Spring OAuth but with a different release cycle).

Grant Types

The grant types supported by the?AuthorizationEndpoint?can be configured via the?AuthorizationServerEndpointsConfigurer. By default all grant types are supported except password (see below for details of how to switch it on). The following properties affect grant types:

  • authenticationManager: password grants are switched on by injecting an?AuthenticationManager.
  • userDetailsService: if you inject a?UserDetailsService?or if one is configured globally anyway (e.g. in a?GlobalAuthenticationManagerConfigurer) then a refresh token grant will contain a check on the user details, to ensure that the account is still active
  • authorizationCodeServices: defines the authorization code services (instance of?AuthorizationCodeServices) for the auth code grant.
  • implicitGrantService: manages state during the imlpicit grant.
  • tokenGranter: the?TokenGranter?(taking full control of the granting and ignoring the other properties above)

In XML grant types are included as child elements of the?authorization-server.

Configuring the Endpoint URLs

The?AuthorizationServerEndpointsConfigurer?has a?pathMapping()?method. It takes two arguments:

  • The default (framework implementation) URL path for the endpoint
  • The custom path required (starting with a "/")

The URL paths provided by the framework are?/oauth/authorize?(the authorization endpoint),?/oauth/token?(the token endpoint),?/oauth/confirm_access?(user posts approval for grants here),?/oauth/error?(used to render errors in the authorization server),?/oauth/check_token?(used by Resource Servers to decode access tokens), and?/oauth/token_key?(exposes public key for token verification if using JWT tokens).

N.B. the Authorization endpoint?/oauth/authorize?(or its mapped alternative) should be protected using Spring Security so that it is only accessible to authenticated users. For instance using a standard Spring Security?WebSecurityConfigurer:

@Overrideprotected void configure(HttpSecurity http) throws Exception {http.authorizeRequests().antMatchers("/login").permitAll().and()// default protection for all resources (including /oauth/authorize).authorizeRequests().anyRequest().hasRole("USER")// ... more configuration, e.g. for form login}

Note: if your Authorization Server is also a Resource Server then there is another security filter chain with lower priority controlling the API resources. Fo those requests to be protected by access tokens you need their paths?not?to be matched by the ones in the main user-facing filter chain, so be sure to include a request matcher that picks out only non-API resources in the?WebSecurityConfigurer?above.

The token endpoint is protected for you by default by Spring OAuth in the?@Configuration?support using HTTP Basic authentication of the client secret. This is not the case in XML (so it should be protected explicitly).

In XML the?<authorization-server/>?element has some attributes that can be used to change the default endpoint URLs in a similar way. The?/check_token?endpoint has to be explicitly enabled (with the?check-token-enabled?attribute).

Customizing the UI

Most of the Authorization Server endpoints are used primarily by machines, but there are a couple of resource that need a UI and those are the GET for?/oauth/confirm_access?and the HTML response from?/oauth/error. They are provided using whitelabel implementations in the framework, so most real-world instances of the Authorization Server will want to provide their own so they can control the styling and content. All you need to do is provide a Spring MVC controller with?@RequestMappings?for those endpoints, and the framework defaults will take a lower priority in the dispatcher. In the?/oauth/confirm_access?endpoint you can expect an?AuthorizationRequest?bound to the session carrying all the data needed to seek approval from the user (the default implementation is?WhitelabelApprovalEndpoint?so look there for a starting point to copy). You can grab all the data from that request and render it however you like, and then all the user needs to do is POST back to?/oauth/authorize?with information about approving or denying the grant. The request parameters are passed directly to a?UserApprovalHandler?in the?AuthorizationEndpoint?so you can interpret the data more or less as you please. The default?UserApprovalHandler?depends on whether or not you have supplied an?ApprovalStore?in your?AuthorizationServerEndpointsConfigurer?(in which case it is an?ApprovalStoreUserApprovalHandler) or not (in which case it is a?TokenStoreUserApprovalHandler). The standard approval handlers accept the following:

  • TokenStoreUserApprovalHandler: a simple yes/no decision via?user_oauth_approval?equals to "true" or "false".

  • ApprovalStoreUserApprovalHandler: a set of?scope.*?parameter keys with "*" equal to the scopes being requested. The value of the parameter can be "true" or "approved" (if the user approved the grant) else the user is deemed to have rejected that scope. A grant is successful if at least one scope is approved.

NOTE: don't forget to include CSRF protection in your form that you render for the user. Spring Security is expecting a request parameter called "_csrf" by default (and it provides the value in a request attribute). See the Spring Security user guide for more information on that, or look at the whitelabel implementation for guidance.

Enforcing SSL

Plain HTTP is fine for testing but an Authorization Server should only be used over SSL in production. You can run the app in a secure container or behind a proxy and it should work fine if you set the proxy and the container up correctly (which is nothing to do with OAuth2). You might also want to secure the endpoints using Spring Security?requiresChannel()?constraints. For the?/authorize?endpoint is up to you to do that as part of your normal application security. For the?/token?endpoint there is a flag in the?AuthorizationServerEndpointsConfigurer?that you can set using the?sslOnly()?method. In both cases the secure channel setting is optional but will cause Spring Security to redirect to what it thinks is a secure channel if it detects a request on an insecure channel.

Customizing the Error Handling

Error handling in an Authorization Server uses standard Spring MVC features, namely?@ExceptionHandler?methods in the endpoints themselves. Users can also provide a?WebResponseExceptionTranslator?to the endpoints themselves which is the best way to change the content of the responses as opposed to the way they are rendered. The rendering of exceptions delegates to?HttpMesssageConverters?(which can be added to the MVC configuration) in the case of token endpoint and to the OAuth error view (/oauth/error) in the case of teh authorization endpoint. The whitelabel error endpoint is provided for HTML responses, but users probably need to provide a custom implementation (e.g. just add a?@Controllerwith?@RequestMapping("/oauth/error")).

Mapping User Roles to Scopes

It is sometimes useful to limit the scope of tokens not only by the scopes assigned to the client, but also according to the user's own permissions. If you use a?DefaultOAuth2RequestFactory?in your?AuthorizationEndpoint?you can set a flag?checkUserScopes=true?to restrict permitted scopes to only those that match the user's roles. You can also inject an?OAuth2RequestFactory?into the?TokenEndpoint?but that only works (i.e. with password grants) if you also install a?TokenEndpointAuthenticationFilter?- you just need to add that filter after the HTTP?BasicAuthenticationFilter. Of course, you can also implement your own rules for mapping scopes to roles and install your own version of the?OAuth2RequestFactory. The?AuthorizationServerEndpointsConfigurer?allows you to inject a custom?OAuth2RequestFactory?so you can use that feature to set up a factory if you use?@EnableAuthorizationServer.

Resource Server Configuration

A Resource Server (can be the same as the Authorization Server or a separate application) serves resources that are protected by the OAuth2 token. Spring OAuth provides a Spring Security authentication filter that implements this protection. You can switch it on with?@EnableResourceServer?on an?@Configuration?class, and configure it (as necessary) using a?ResourceServerConfigurer. The following features can be configured:

  • tokenServices: the bean that defines the token services (instance of?ResourceServerTokenServices).
  • resourceId: the id for the resource (optional, but recommended and will be validated by the auth server if present).
  • other extension points for the resourecs server (e.g.?tokenExtractor?for extracting the tokens from incoming requests)
  • request matchers for protected resources (defaults to all)
  • access rules for protected resources (defaults to plain "authenticated")
  • other customizations for the protected resources permitted by the?HttpSecurity?configurer in Spring Security

The?@EnableResourceServer?annotation adds a filter of type?OAuth2AuthenticationProcessingFilter?automatically to the Spring Security filter chain.

In XML there is a?<resource-server/>?element with an?id?attribute - this is the bean id for a servlet?Filter?that can then be added manually to the standard Spring Security chain.

Your?ResourceServerTokenServices?is the other half of a contract with the Authorization Server. If the Resource Server and Authorization Server are in the same application and you use?DefaultTokenServices?then you don't have to think too hard about this because it implements all the necessary interfaces so it is automatically consistent. If your Resource Server is a separate application then you have to make sure you match the capabilities of the Authorization Server and provide a?ResourceServerTokenServices?that knows how to decode the tokens correctly. As with the Authorization Server, you can often use the?DefaultTokenServices?and the choices are mostly expressed through the?TokenStore?(backend storage or local encoding). An alternative is the?RemoteTokenServices?which is a Spring OAuth features (not part of the spec) allowing Resource Servers to decode tokens through an HTTP resource on the Authorization Server (/oauth/check_token).?RemoteTokenServices?are convenient if there is not a huge volume of traffic in the Resource Servers (every request has to be verified with the Authorization Server), or if you can afford to cache the results. To use the?/oauth/check_token?endpoint you need to expose it by changing its access rule (default is "denyAll()") in the?AuthorizationServerSecurityConfigurer, e.g.

@Overridepublic void configure(AuthorizationServerSecurityConfigurer oauthServer) throws Exception {oauthServer.tokenKeyAccess("isAnonymous() || hasAuthority('ROLE_TRUSTED_CLIENT')").checkTokenAccess("hasAuthority('ROLE_TRUSTED_CLIENT')");}

In this example we are configuring both the?/oauth/check_token?endpoint and the?/oauth/token_key?endpoint (so trusted resources can obtain the public key for JWT verification). These two endpoints are protected by HTTP Basic authentication using client credentials.

Configuring An OAuth-Aware Expression Handler

You may want to take advantage of Spring Security's?expression-based access control. An expression handler will be registered by default in the?@EnableResourceServer?setup. The expressions include?#oauth2.clientHasRole,?#oauth2.clientHasAnyRole, and?#oath2.denyClient?which can be used to provide access based on the role of the oauth client (see?OAuth2SecurityExpressionMethods?for a comprehensive list). In XML you can register a oauth-aware expression handler with the?expression-handler?element of the regular?<http/>?security configuration.

OAuth 2.0 Client

The OAuth 2.0 client mechanism is responsible for access the OAuth 2.0 protected resources of other servers. The configuration involves establishing the relevant protected resources to which users might have access. The client may also need to be supplied with mechanisms for storing authorization codes and access tokens for users.

Protected Resource Configuration

Protected resources (or "remote resources") can be defined using bean definitions of type?OAuth2ProtectedResourceDetails. A protected resource has the following properties:

  • id: The id of the resource. The id is only used by the client to lookup the resource; it's never used in the OAuth protocol. It's also used as the id of the bean.
  • clientId: The OAuth client id. This is the id by which the OAuth provider identifies your client.
  • clientSecret: The secret associated with the resource. By default, no secret is empty.
  • accessTokenUri: The URI of the provider OAuth endpoint that provides the access token.
  • scope: Comma-separted list of strings specifying the scope of the access to the resource. By default, no scope will be specified.
  • clientAuthenticationScheme: The scheme used by your client to authenticate to the access token endpoint. Suggested values: "http_basic" and "form". Default: "http_basic". See section 2.1 of the OAuth 2 spec.

Different grant types have different concrete implementations of?OAuth2ProtectedResourceDetails?(e.g.?ClientCredentialsResource?for "client_credentials" grant type). For grant types that require user authorization there is a further property:

  • userAuthorizationUri: The uri to which the user will be redirected if the user is ever needed to authorize access to the resource. Note that this is not always required, depending on which OAuth 2 profiles are supported.

In XML there is a?<resource/>?element that can be used to create a bean of type?OAuth2ProtectedResourceDetails. It has attributes matching all the properties above.

Client Configuration

For the OAuth 2.0 client, configuration is simplified using?@EnableOAuth2Client. This does 2 things:

  • Creates a filter bean (with ID?oauth2ClientContextFilter) to store the current request and context. In the case of needing to authenticate during a request it manages the redirection to and from the OAuth authentication uri.

  • Creates a bean of type?AccessTokenRequest?in request scope. This can be used by authorization code (or implicit) grant clients to keep state related to individual users from colliding.

The filter has to be wired into the application (e.g. using a Servlet initializer or?web.xml?configuration for a?DelegatingFilterProxy?with the same name).

The?AccessTokenRequest?can be used in an?OAuth2RestTemplate?like this:

@Autowired private OAuth2ClientContext oauth2Context;@Bean public OAuth2RestTemplate sparklrRestTemplate() {return new OAuth2RestTemplate(sparklr(), oauth2Context); }

The OAuth2ClientContext is placed (for you) in session scope to keep the state for different users separate. Without that you would have to manage the equivalent data structure yourself on the server, mapping incoming requests to users, and associating each user with a separate instance of the?OAuth2ClientContext.

In XML there is a?<client/>?element with an?id?attribute - this is the bean id for a servlet?Filter?that must be mapped as in the?@Configurationcase to a?DelegatingFilterProxy?(with the same name).

Accessing Protected Resources

Once you've supplied all the configuration for the resources, you can now access those resources. The suggested method for accessing those resources is by using?the?RestTemplate?introduced in Spring 3. OAuth for Spring Security has provided?an extension of RestTemplate?that only needs to be supplied an instance of?OAuth2ProtectedResourceDetails. To use it with user-tokens (authorization code grants) you should consider using the?@EnableOAuth2Client?configuration (or the XML equivalent?<oauth:rest-template/>) which creates some request and session scoped context objects so that requests for different users do not collide at runtime.

As a general rule, a web application should not use password grants, so avoid using?ResourceOwnerPasswordResourceDetails?if you can in favour of?AuthorizationCodeResourceDetails. If you desparately need password grants to work from a Java client, then use the same mechanism to configure your?OAuth2RestTemplate?and add the credentials to the?AccessTokenRequest?(which is a?Map?and is ephemeral) not the?ResourceOwnerPasswordResourceDetails?(which is shared between all access tokens).

Persisting Tokens in a Client

A client does not?need?to persist tokens, but it can be nice for users to not be required to approve a new token grant every time the client app is restarted. The?ClientTokenServices?interface defines the operations that are necessary to persist OAuth 2.0 tokens for specific users. There is a JDBC implementation provided, but you can if you prefer implement your own service for storing the access tokens and associated authentication instances in a persistent database. If you want to use this feature you need provide a specially configured?TokenProvider?to the?OAuth2RestTemplatee.g.

@Bean @Scope(value = "session", proxyMode = ScopedProxyMode.INTERFACES) public OAuth2RestOperations restTemplate() { OAuth2RestTemplate template = new OAuth2RestTemplate(resource(), new DefaultOAuth2ClientContext(accessTokenRequest)); AccessTokenProviderChain provider = new AccessTokenProviderChain(Arrays.asList(new AuthorizationCodeAccessTokenProvider())); provider.setClientTokenServices(clientTokenServices()); return template; }

Customizations for Clients of External OAuth2 Providers

Some external OAuth2 providers (e.g.?Facebook) do not quite implement the specification correctly, or else they are just stuck on an older version of the spec than Spring Security OAuth. To use those providers in your client application you might need to adapt various parts of the client-side infrastructure.

To use Facebook as an example, there is a Facebook feature in the?tonr2?application (you need to change the configuration to add your own, valid, client id and secret - they are easy to generate on the Facebook website).

Facebook token responses also contain a non-compliant JSON entry for the expiry time of the token (they use?expires?instead of?expires_in), so if you want to use the expiry time in your application you will have to decode it manually using a custom?OAuth2SerializationService.

轉載于:https://www.cnblogs.com/davidwang456/p/6531813.html

總結

以上是生活随笔為你收集整理的spring security oauth2 架构---官方的全部內容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。

97国产精品久久 | 色姑娘综合天天 | 亚洲人视频在线 | 韩日精品中文字幕 | 97成人资源 | 99高清视频有精品视频 | 天海翼一区二区三区免费 | 欧美色图p | 伊人婷婷激情 | 久草av在线播放 | 久久精视频 | 日本三级中文字幕在线观看 | 夜夜婷婷 | 日韩中文字幕a | 99久热在线精品视频 | 天天草天天操 | 国产无吗一区二区三区在线欢 | 免费在线精品视频 | 国产精品午夜在线观看 | 国产在线观看91 | 久草在线手机观看 | 国产日本三级 | 婷婷激情小说网 | 国产一区二区在线免费播放 | 亚洲精品午夜久久久 | 国产成人99久久亚洲综合精品 | 国产精品观看视频 | 免费日韩一区 | 国产黄大片 | 欧美aa级 | 精品视频在线免费观看 | 欧美日韩国产一区二区三区在线观看 | 丁香视频免费观看 | 国产精品涩涩屋www在线观看 | 国产第一二区 | 人人射人人爽 | 国色天香在线观看 | 久精品在线观看 | 欧美视频国产视频 | 久久免费视频4 | 91精品国产一区 | 成人中文字幕在线 | 97超碰在线播放 | 中文字幕一区二区三区久久蜜桃 | 香蕉视频国产在线观看 | 免费看毛片在线 | 99精品欧美一区二区蜜桃免费 | 午夜久久福利 | 永久黄网站色视频免费观看w | 在线观看成人 | 欧美在线99 | 久久久久网址 | 在线网址你懂得 | 日韩一级黄色av | 免费特级黄毛片 | 成人毛片在线观看 | 国产视频网站在线观看 | 在线观看资源 | 欧美日韩xxxxx| 91成人蝌蚪 | 亚洲精品久久久久中文字幕二区 | 久久久久久久久久久电影 | 91av短视频 | 91视频成人免费 | 色婷婷啪啪免费在线电影观看 | 网址你懂的在线观看 | 91在线影视 | 成人免费视频网 | 丁香花在线视频观看免费 | 九九精品视频在线观看 | 在线观看国产区 | 亚洲黄色片在线 | 探花视频网站 | 国产免费又粗又猛又爽 | 91试看| 欧美analxxxx| 99日韩精品| 久久久久国产精品免费网站 | 日韩videos | 91在线视频免费播放 | 91精品久久久久久久久 | 亚洲一区二区三区精品在线观看 | 超碰99人人| 狠狠狠色丁香综合久久天下网 | 不卡的av在线 | 91高清视频在线 | 四虎天堂| 99国产在线视频 | 亚洲国产大片 | 碰碰影院 | www.xxx.性狂虐| 亚洲视频播放 | 69视频在线 | 日韩在线高清免费视频 | 国产老太婆免费交性大片 | 日韩欧美在线观看一区二区 | 婷婷丁香在线视频 | 国产一区二区不卡在线 | 丁香婷婷亚洲 | 国产在线视频在线观看 | 亚洲区另类春色综合小说校园片 | 在线免费av电影 | 日韩专区在线观看 | 亚洲精品久久久久久久蜜桃 | 天天插日日射 | 久久久久免费看 | 国产馆在线播放 | 五月开心网 | 国产专区视频 | 亚洲国产精品第一区二区 | 国产精品伦一区二区三区视频 | 国产精品美女免费看 | 四虎成人精品在永久免费 | 日韩视频中文字幕在线观看 | 中文字幕欧美日韩va免费视频 | 午夜久久成人 | 91精品国产91久久久久 | 狠狠地日 | 日日激情| 六月色丁香 | 精品久久精品 | 亚洲 综合 专区 | 麻豆91小视频 | 999久久久久久久久6666 | 色97在线 | www.伊人网 | www.黄色小说.com| 国产一级片免费播放 | 91精品国产一区二区在线观看 | 91成人在线观看喷潮 | 久久国产影院 | 天天色天天爱天天射综合 | 国产玖玖精品视频 | 中文字幕一区二区三区乱码在线 | 99久久精品免费看国产一区二区三区 | 黄色毛片一级片 | 日韩精品一区电影 | 日韩高清精品一区二区 | 久久久国产一区二区三区 | 久久久五月天 | 国内精品久久天天躁人人爽 | 国产国语在线 | 日韩久久精品一区二区 | 精品国产理论 | 缴情综合网五月天 | 久久中国精品 | 午夜精品久久久久久久99 | 精品久久久久国产免费第一页 | 91精品国产综合久久婷婷香蕉 | 99视频国产精品免费观看 | 欧美色图88 | 成人一级片免费看 | 久久综合久久综合九色 | 国产99久久久久久免费看 | 四虎永久精品在线 | 美女视频一区 | 婷色| 亚洲高清网站 | 国产精品久久久久三级 | 国产精品亚洲视频 | 香蕉视频在线网站 | 91精品对白一区国产伦 | 亚洲午夜大片 | 国产第一页精品 | 特级西西www44高清大胆图片 | 91.麻豆视频 | 黄色av一级 | 国产女教师精品久久av | 久久小视频 | 波多野结衣在线观看一区 | 玖草在线观看 | 97视频人人 | 色操插| 国产另类av | 99中文视频在线 | 国语精品久久 | 91大神dom调教在线观看 | 99久久99久久| 婷婷久操 | a精品视频 | 国产原创av片 | 久久高清国产 | 九九热精品视频在线观看 | 亚洲精品国产日韩 | 很黄很色很污的网站 | 免费视频在线观看网站 | 99亚洲精品 | 国产精品视频 | 亚洲免费婷婷 | 丁香综合五月 | 免费91在线| 在线观看 国产 | 亚洲精品中文字幕在线 | 中文字幕在线影院 | 最新国产一区二区三区 | 国产精品99久久久久久人免费 | 97天堂| 日韩高清一| 黄色片网站av | 国产一区在线视频播放 | 久久久久久97三级 | 99在线热播 | 91最新网址在线观看 | 天天操天天摸天天爽 | 欧美国产不卡 | 日韩激情在线 | 国产精品免费在线 | 特级西西www44高清大胆图片 | 亚洲精品乱码久久久久久按摩 | 国产高清av在线播放 | 久久久久这里只有精品 | japanesefreesexvideo高潮 | 久久兔费看a级 | 成人国产精品入口 | 国产欧美精品在线观看 | 日韩精品一区二区不卡 | 最新精品视频在线 | 成人黄色电影免费观看 | 狠狠的日 | 亚洲激情视频在线 | 久久久免费观看视频 | av在线播放中文字幕 | 日韩精品一区二区在线视频 | 久草在线91 | av 一区二区三区 | 亚洲开心激情 | 视频国产在线观看18 | 亚洲黄色一级视频 | 九草在线视频 | 在线不卡a | 黄色成人在线观看 | 探花视频免费观看 | 国产成人一区二区三区在线观看 | 成人久久毛片 | 成人在线黄色电影 | 亚洲精品视频一 | 精品自拍av | 久久久av电影 | 中文字幕在线观看免费高清电影 | 久草新在线 | 亚洲成成品网站 | 日韩在线观看av | 国产精品国产三级国产aⅴ无密码 | a级国产毛片 | 91手机视频在线 | 伊人亚洲精品 | 日本中文在线 | 成人黄色免费在线观看 | 99久久久国产精品免费99 | 丁香婷婷综合激情 | 超碰在线人人草 | 国产欧美精品xxxx另类 | 午夜视频日本 | 精品国产乱码一区二区三区在线 | av午夜电影| 欧美在线观看小视频 | 在线观看国产区 | 中文字幕在线网 | 欧美色婷 | 色播99| 久久99影院| 成人午夜精品福利免费 | 亚洲欧美视频在线播放 | 国产亚洲精品久久久久久电影 | 午夜在线观看一区 | 久久久综合色 | 香蕉视频国产在线观看 | 在线观看亚洲a | 在线超碰av | 欧美aa在线 | 999免费视频 | 超碰在线官网 | 奇米影视777影音先锋 | 国产91在线看 | 亚洲成人一区 | 欧美亚洲免费在线一区 | 一区二区三区观看 | 日韩偷拍精品 | 亚洲情感电影大片 | 日日操网站| 日韩二区在线播放 | 色噜噜在线观看 | 国产精品一二 | 国产成人精品一区二 | 9999精品免费视频 | 在线亚洲小视频 | 国产婷婷 | 在线三级中文 | 国产亚洲视频中文字幕视频 | 亚洲国产播放 | 日日碰狠狠添天天爽超碰97久久 | 日日夜夜天天操 | 在线免费中文字幕 | 日韩一二三区不卡 | 久久99国产综合精品 | 国产综合在线观看视频 | 99色网站 | 少妇性色午夜淫片aaaze | 久久日韩精品 | 999久久国产精品免费观看网站 | av不卡中文字幕 | 99视频国产精品免费观看 | 韩国av电影在线观看 | 13日本xxxxxⅹxxx20 | 88av色| 狠狠色丁香婷婷综合最新地址 | 免费福利视频网 | 免费在线观看不卡av | 国产成人在线播放 | 欧美最新另类人妖 | 国产亚洲欧美日韩高清 | 国产成人一二片 | 国产 一区二区三区 在线 | 婷婷国产v亚洲v欧美久久 | 中字幕视频在线永久在线观看免费 | 久久久久麻豆 | 在线精品在线 | 国产99久久99热这里精品5 | 91资源在线免费观看 | 亚洲免费a | 中文字幕在线观看视频网站 | 欧美精品亚洲二区 | 黄色大全视频 | 久久婷婷国产色一区二区三区 | 免费看一级特黄a大片 | 国产精品一区二区免费视频 | 最新av网站在线观看 | 日韩欧美久久 | 超碰在线97免费 | 国产精品视频地址 | 国产啊v在线 | 欧美九九视频 | 天天色天天射天天操 | 麻豆视频免费在线观看 | 日韩高清 一区 | 免费在线播放av电影 | 国产精品青草综合久久久久99 | 国产美女精品视频 | 国产成人精品网站 | 婷婷激情综合 | 中文字幕在线播放第一页 | 99精品免费视频 | 在线综合色 | 久久久不卡影院 | 在线a视频 | 欧美一区二区三区在线看 | 中文字幕之中文字幕 | 伊人夜夜 | 最新日韩在线观看视频 | 一区二区三区高清不卡 | 就操操久久 | 色午夜 | 成年人免费在线播放 | 亚洲精品美女久久久久 | 国产日韩在线视频 | 亚洲国产中文字幕在线观看 | wwwwwww色 | 国产成人精品电影久久久 | 亚洲精品免费在线播放 | 国产亚洲成av人片在线观看桃 | 日韩在线精品一区 | 国产精品一区在线播放 | 国产成人精品999 | 在线观看中文字幕第一页 | 国产一区二区在线观看视频 | 香蕉视频免费在线播放 | 99热精品久久 | 麻豆一级视频 | 99精品观看 | 欧美在线观看小视频 | 久久久免费毛片 | 国产精品成人一区 | 波多野结衣在线观看视频 | 五月婷婷六月丁香激情 | 黄色av免费 | 91看片在线 | 国产精品久久久久久超碰 | 黄色网www| 日韩在线视频观看免费 | 国产精品热视频 | 欧美精品久久久久久久久久白贞 | 久久精品欧美 | 精品999国产| 极品久久久久久久 | 免费一级片在线 | 久久精品专区 | 99久久这里只有精品 | 免费网站污 | 色综合天天色 | 日韩免费中文 | 波多野结衣一区二区 | 99视频在线免费看 | 久久综合视频网 | 国产精品免费久久久久影院仙踪林 | 成年人黄色免费网站 | 人人干天天射 | 日韩字幕在线 | 国产精品久久久久一区二区 | 在线一二区 | 91porny九色91啦中文 | 欧美最爽乱淫视频播放 | 国产99久久99热这里精品5 | 特级西西444www高清大视频 | 有码一区二区三区 | 日韩午夜视频在线观看 | 狠狠躁18三区二区一区ai明星 | av三级在线看 | 国内精品久久久久久久97牛牛 | 日本中文字幕免费观看 | 国产成人三级三级三级97 | 国产精品精品视频 | zzijzzij日本成熟少妇 | 亚洲色图 校园春色 | 日韩美精品视频 | 又黄又爽又色无遮挡免费 | 欧美日韩调教 | 久久精品成人欧美大片古装 | 色综合天 | 天天操天天色天天射 | 在线看小早川怜子av | 狠狠色噜噜狠狠狠狠2021天天 | 91在线免费视频观看 | 少妇性色午夜淫片aaaze | 九九久久国产 | 欧美激情视频一区二区三区免费 | 国产电影黄色av | 91精品视频在线免费观看 | 午夜精品一区二区三区在线视频 | 欧美激情综合色综合啪啪五月 | 欧美一级片在线免费观看 | 国产一区二区三区网站 | 国产精品不卡 | 久久99亚洲精品久久 | 欧美一区二区三区特黄 | 天天爽人人爽夜夜爽 | 日韩在线视频网 | 国产一区精品在线 | 久久人人精 | 久久国产精品一区二区三区四区 | 国产精品视频大全 | 久草在线欧美 | www色av | 欧美视频国产视频 | 欧美日韩国产区 | 1000部18岁以下禁看视频 | 黄色成人av| 中文字幕亚洲综合久久五月天色无吗'' | 久久开心激情 | 国产精品成久久久久三级 | 天天曰天天干 | 91人人澡 | 日韩精品资源 | av在线收看 | 美女视频黄免费网站 | 中文字幕高清av | 国产亚洲va综合人人澡精品 | 国产一级淫片在线观看 | 一级片免费在线 | 日本久久久久久科技有限公司 | 国产尤物在线 | 婷婷综合电影 | 欧美极度另类性三渗透 | 人人澡人人添人人爽一区二区 | 日韩欧美综合精品 | 国产一区免费观看 | 国产精品成人在线 | 亚洲va在线va天堂 | 99精品国产aⅴ | 久久久久中文 | 婷婷色五| av女优中文字幕在线观看 | 国产精品99久久久久久宅男 | 一区二区三区视频 | 亚洲成人av一区二区 | 香蕉网在线播放 | 久久久www成人免费精品张筱雨 | 中文字幕久久精品亚洲乱码 | 日韩高清精品免费观看 | 久久福利小视频 | 91av在线电影 | 天天视频色版 | 在线免费黄色av | 亚洲撸撸 | 91香蕉国产在线观看软件 | av在线不卡观看 | 欧美久久久久久久久久久 | 国产精品1区2区在线观看 | 九色91在线 | 黄色毛片视频免费观看中文 | 亚欧日韩成人h片 | 国产精品99久久久久久武松影视 | 国产不卡在线视频 | 免费国产黄线在线观看视频 | 国产亚洲精品久久久久久移动网络 | 91香蕉视频色版 | 国内成人精品2018免费看 | 丁香花在线观看免费完整版视频 | 午夜精品一区二区三区在线 | 国产剧情在线一区 | 久久成人免费视频 | 黄色免费观看视频 | 91av在线不卡 | 亚洲视频axxx| 久草网在线观看 | 免费在线成人av电影 | 午夜精品一区二区三区在线 | 在线观看久 | 久久精品欧美视频 | 久久天天躁夜夜躁狠狠躁2022 | 成年人看片网站 | 99精品免费久久久久久日本 | 亚洲日本三级 | 99精品视频在线看 | 青青射| 九九热精品视频在线播放 | 99精品视频一区二区 | 91视频在线观看下载 | 国内外成人免费在线视频 | 婷婷五情天综123 | 在线黄网站 | 视频精品一区二区三区 | 免费日韩一区二区三区 | 综合久久久久久久久 | 日韩黄色中文字幕 | 久久超级碰 | 精品国产乱码久久久久久浪潮 | 国产黄色av网站 | av三级av | 一本一道波多野毛片中文在线 | 91网免费观看 | 日韩一级成人av | 国产精品久久久久久久久久久不卡 | 中文字幕在线看视频国产中文版 | 一区 二区 精品 | 中文字幕一区在线 | 毛片无卡免费无播放器 | 九九热中文字幕 | 国产成人久久久77777 | 亚洲免费不卡 | 精品夜夜嗨av一区二区三区 | 在线免费观看黄 | 国产成人精品一区二三区 | 在线视频区 | 国产一区播放 | 色综合久久88色综合天天免费 | 国产手机在线观看视频 | 亚洲视频在线观看免费 | 91完整版| 欧美日韩一级在线 | 伊人五月天.com | 99久久久久免费精品国产 | 97超碰资源网 | 成人性生交大片免费看中文网站 | 91大神精品视频在线观看 | 国产精品久久久久久高潮 | 欧美男女爱爱视频 | 狠狠伊人 | 久久视频二区 | 亚洲久草网 | 国产日韩精品在线 | 成人一区二区三区中文字幕 | 亚洲精品中文字幕在线 | 久草在线手机观看 | 亚洲午夜av| 久久黄色影视 | www.色五月| 日韩欧美一区二区三区视频 | 天天干天天摸 | 久久一区国产 | 久久九九影院 | 日韩精品2区 | 中文在线亚洲 | 国产高清在线免费视频 | 日本护士三级少妇三级999 | 欧美日韩在线播放一区 | 天天曰天天爽 | 亚洲高清在线视频 | 亚洲精品久久在线 | 最新中文字幕视频 | 韩日三级在线 | 欧美日韩中文另类 | 色www. | 偷拍区另类综合在线 | 久久理论电影网 | 国产二区视频在线 | 久久国产免 | 91精品国产麻豆 | 国产欧美日韩精品一区二区免费 | 天天爱天天操天天射 | 涩涩成人在线 | 国产福利一区二区在线 | 久久精品国产第一区二区三区 | av福利超碰网站 | 四虎影视精品成人 | 人人插人人 | 精品电影一区 | 久久午夜电影院 | 丁香色婷婷 | 97人人超 | 国产专区免费 | 最近乱久中文字幕 | 五月花激情 | 在线视频国产区 | 国产精品久久99综合免费观看尤物 | www.夜夜| 久草精品资源 | 人人爽久久涩噜噜噜网站 | 成人免费观看视频网站 | 视频在线在亚洲 | 亚洲电影免费 | 日韩在线无 | 98精品国产自产在线观看 | 中文字幕第 | 色狠狠婷婷 | 久热只有精品 | 亚洲一区欧美精品 | 欧美久久久影院 | 久久久私人影院 | 亚洲国产中文在线观看 | 国产一区二区三区黄 | 亚洲激情综合网 | 免费手机黄色网址 | 亚洲精品国偷拍自产在线观看 | 99久久超碰中文字幕伊人 | 中文字幕麻豆 | 国产小视频免费在线观看 | 在线a视频免费观看 | 国产理伦在线 | 正在播放亚洲精品 | 午夜精品剧场 | 久久久久久久久久免费 | 中文字幕在线观看日本 | 国产第一页在线播放 | 高清av中文在线字幕观看1 | 日韩在线视频精品 | 亚洲精品在线二区 | 国产精品一区二区免费在线观看 | 成人午夜剧场在线观看 | 亚洲欧洲日韩 | 免费影视大全推荐 | 在线观看免费黄色 | 五月婷婷在线视频观看 | 5月丁香婷婷综合 | 亚洲欧洲美洲av | 久久久综合| 久久久久国产精品免费 | 中文字幕色在线 | 久久精品婷婷 | av在线小说 | www.国产精品 | 免费观看的黄色片 | 日韩黄色在线观看 | 国产成人精品在线 | 女人18精品一区二区三区 | 超碰97人人射妻 | 日韩国产欧美在线播放 | 国产不卡在线观看 | 亚洲黑丝少妇 | 麻豆精品91 | 一区二区三区四区影院 | 久操久 | 天天色天天射天天干 | 日日天天干 | 麻豆免费在线视频 | 少妇按摩av | 欧美久久久久久久久久久久久 | 91系列在线| 五月婷婷丁香色 | 手机av在线网站 | www国产亚洲| 人人爱在线视频 | 精品久久久久久一区二区里番 | 久久国产精品99久久久久 | 在线观看www. | 黄色成年网站 | 日韩性网站| 999久久久 | 亚洲精品视频免费看 | 五月婷婷一级片 | 欧美日韩中文在线观看 | 香蕉视频免费看 | 亚洲一区二区精品在线 | 激情动态 | 狠狠干夜夜 | 色视频国产直接看 | 欧美日韩一区久久 | 手机看片久久 | 国外av在线 | 欧美日本一区 | 九九色视频 | 九九九九热精品免费视频点播观看 | 日韩成人黄色av | 午夜在线免费观看视频 | av免费看在线 | 毛片视频电影 | 91热视频在线观看 | 久草视频中文在线 | 国产精品电影一区二区 | 不卡av在线免费观看 | 在线激情电影 | 久久国产精品99久久人人澡 | 在线免费黄色毛片 | 日韩高清一区 | 二区三区在线观看 | 夜夜骑首页 | 国产精品日韩在线 | 国产精品自拍在线 | 亚洲精品在线免费观看视频 | 99 色 | 一级黄色毛片 | 国产日韩精品一区二区在线观看播放 | 国产资源中文字幕 | 五月婷香| 久久综合影音 | 久久婷婷丁香 | 国产精品毛片一区二区在线看 | 国产日韩中文字幕在线 | 在线黄频 | 五月天网站在线 | 午夜影院一级 | 婷香五月 | 成人网444ppp | 99亚洲国产 | 午夜视频在线观看一区 | 欧美日韩免费观看一区二区三区 | 国产高清av免费在线观看 | 日韩激情片在线观看 | 久久天堂影院 | 不卡av在线免费观看 | 91av中文 | 久久免费看a级毛毛片 | 国产在线一区二区 | 一区二区三区电影在线播 | 精品国产午夜 | 97精品国产97久久久久久久久久久久 | 精品九九九九 | 丝袜美女视频网站 | 日韩精品一区二区电影 | 亚洲免费视频在线观看 | 99精品视频在线观看免费 | 四虎影院在线观看av | 色姑娘综合天天 | 免费日韩三级 | 香蕉视频国产在线观看 | 色网站黄 | 三上悠亚一区二区在线观看 | 九九亚洲精品 | 欧美一级片在线免费观看 | 天天爱天天操天天爽 | 丁香婷婷射 | 丁香久久| 中文字幕文字幕一区二区 | 亚洲成人黄色在线观看 | 99亚洲国产 | 99热99| 精品高清美女精品国产区 | 青青草国产精品视频 | 亚洲精欧美一区二区精品 | 91成人网在线观看 | 日韩精品欧美视频 | 在线观看黄色免费视频 | 中文字幕资源网在线观看 | 国产精品久久久久久久久婷婷 | 国产精品观看在线亚洲人成网 | 蜜臀aⅴ国产精品久久久国产 | 国产麻豆剧果冻传媒视频播放量 | 特级免费毛片 | 亚洲精品女人久久久 | 伊人狠狠操| 激情网在线视频 | 五月综合激情 | www视频在线观看 | 中文字幕一区二区三区乱码不卡 | 欧美日韩国产成人 | 69国产盗摄一区二区三区五区 | 亚洲极色 | 99人久久精品视频最新地址 | 在线看一区二区 | www.一区二区三区 | 五月天com | 国产一级大片免费看 | 午夜婷婷在线播放 | 亚洲视频在线免费观看 | 国产美女精品视频 | 青春草免费视频 | 成人在线观看你懂的 | 日韩精品 在线视频 | 欧美热久久 | 国产一区二区不卡视频 | 91高清视频 | 网站在线观看你们懂的 | 久久久久久久免费观看 | 香蕉影院在线 | 免费看v片网站 | 亚洲国产av精品毛片鲁大师 | 日韩在线高清免费视频 | 五月天综合激情网 | 夜夜躁日日躁狠狠躁 | 99久久精品免费 | 香蕉视频日本 | 日韩高清观看 | 精品国产一区二区三区在线 | 中文字幕在线成人 | 成人污视频在线观看 | 99热这里有精品 | 69国产成人综合久久精品欧美 | 欧美一二区在线 | 国产精品久久久久久久久毛片 | 午夜丁香视频在线观看 | 国产精品自产拍在线观看中文 | 亚洲精品视频在线播放 | 国产一区在线免费观看 | 91高清视频 | 天天干夜夜想 | 亚洲国产免费看 | 成人精品久久久 | 久久人人97超碰国产公开结果 | 一级免费看 | 欧美少妇bbwhd | 国产免费片 | 在线免费性生活片 | 一区av在线播放 | 亚洲激情 欧美激情 | 国产精品av免费在线观看 | 操操操综合| 中文字幕在线观看网站 | 午夜色性片 | 成人黄色中文字幕 | 亚洲黄色网络 | 国产精品免费一区二区三区 | 亚洲高清色综合 | 国产精品日韩在线播放 | 中文字幕免费不卡视频 | 精品亚洲免a | 91字幕| 中文字幕在线观看不卡 | 精品免费在线视频 | 国产精品视频全国免费观看 | 国产精品久久久久av福利动漫 | 伊人婷婷综合 | 久久桃花网 | 狠狠做六月爱婷婷综合aⅴ 日本高清免费中文字幕 | 在线观影网站 | 日韩免费视频观看 | 中文字幕日韩电影 | 国产乱老熟视频网88av | 久久天堂亚洲 | 中文字幕在线视频一区 | 久久精品波多野结衣 | 一区二区三区动漫 | 久久国产三级 | 国产精品99久久久久久久久久久久 | 国产中文字幕精品 | 又黄又爽又刺激 | 国产精品网址在线观看 | 91免费观看网站 | 日韩色一区二区三区 | 韩国av免费在线 | 中文字幕亚洲精品日韩 | 国产精品久久久久婷婷 | 人人干人人做 | 欧美一二三区在线观看 | 国产视频欧美视频 | 日韩中文字幕国产 | 国产福利精品一区二区 | 91精品国产欧美一区二区成人 | 日韩理论电影在线观看 | 在线观看韩日电影免费 | 欧美少妇bbwhd | 伊人久久精品久久亚洲一区 | 欧美做受69 | 欧美久久久影院 | 国产高清视频在线播放一区 | 国产精品一区二区三区在线看 | 国产裸体bbb视频 | 麻豆视传媒官网免费观看 | 99久久久久国产精品免费 | 久久成人综合 | 黄色av大片 | 欧美激情视频一二区 | 69视频在线| 免费黄色网止 | 国产高清免费在线观看 | 国产+日韩欧美 | 国产福利一区二区三区视频 | 亚洲涩涩色 | 天天干天天做 | 国产精品久久久久久欧美 | 免费观看国产成人 | 国产精品门事件 | 国产精品久久片 | 天天看天天干 | 亚洲激情影院 | 丁香五香天综合情 | 69精品视频 | 国产精品免费在线观看视频 | 福利视频区 | www亚洲精品 | 最近日本韩国中文字幕 | www.夜夜爽 | 欧美俄罗斯性视频 | 久久av伊人 | 国外调教视频网站 | 四虎视频| 九九九视频在线 | 亚洲黄色在线观看 | 69国产盗摄一区二区三区五区 | 天天色天天上天天操 | 免费影视大全推荐 | 成人免费观看完整版电影 | 欧美日韩视频在线播放 | 久久艹国产视频 | 高清不卡免费视频 | 日韩精品一区电影 | 国产麻豆精品久久一二三 | 国产精品乱码高清在线看 | 三级在线视频观看 | 美女国产精品 | 精品免费一区二区三区 | 狠狠狠色丁香婷婷综合久久五月 | 99色亚洲 | 亚洲精品网址在线观看 | 国产一级做a爱片久久毛片a | 日韩av中文在线 | 亚洲免费精品一区二区 | 国产成人免费高清 | 夜夜天天干 | 夜夜操天天 | 日韩免费观看高清 | 麻豆免费视频观看 | 五月婷婷丁香六月 | 欧美日韩精品免费观看 | 精品久久一 | 97碰碰视频 | 亚洲精选在线 | 成人毛片在线视频 | 久久伦理| 91网在线 | 亚洲精品乱码久久久久久蜜桃动漫 | 伊人夜夜 | 麻豆精品传媒视频 | 久久精品99国产精品日本 | 久久久久久高潮国产精品视 | 免费精品视频在线观看 | 在线观看成人 | 18女毛片| 日韩免费观看一区二区 | 国产精品3 | 精品国产一区二区三区四区在线观看 | 亚洲精品国产精品乱码在线观看 | 久久久久久久久久久免费 | 国产精品av一区二区 | 久久精品一 | 97在线成人 | 午夜精品影院 | 久久精品中文字幕免费mv | 国产精品18毛片一区二区 | 国产日产欧美在线观看 | av免费网站 | 久久久久欧美精品 | 亚洲高清视频在线观看免费 | av大片免费 | 天天爱天天操天天爽 | 国产一级黄色免费看 | 天海翼一区二区三区免费 | 手机在线永久免费观看av片 | 亚洲免费一级电影 | 日韩精品第1页 | 99视频一区二区 | 亚洲狠狠干 | 91色在线观看 | 久草网视频 | 成年人电影免费看 | 亚洲午夜av电影 | 色综合天天天天做夜夜夜夜做 | 97超碰在线资源 | 91在线精品秘密一区二区 | 最新不卡av | 一区二区三区精品在线视频 | 免费99视频 | a在线免费观看视频 | 不卡电影一区二区三区 | 成人小视频在线免费观看 | 日本中文不卡 | 一区二区三区影院 | 在线黄色国产电影 | 国产高清免费在线播放 | 成人免费视频网 | av黄色在线观看 | 国内精品视频在线播放 | 久久社区视频 | 欧美a在线看 | 综合久久五月天 | 欧美一区二区三区在线看 | 久久99久久99精品免费看小说 | 在线电影 你懂得 | 在线视频中文字幕一区 | 国产精品去看片 |