name |
Extreme Networks, Inc. VDX Product Series operating with NOS version 7.3.0aa |
Huawei GaussDB 200 version 6.5.1 build e3690037 |
category |
Network and Network-Related Devices and Systems |
Databases |
scheme |
US |
ES |
status |
archived |
active |
not_valid_after |
11.01.2021 |
22.03.2027 |
not_valid_before |
11.01.2019 |
22.03.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10928-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32_Certificado.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10928-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-INF-3664.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10928-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-ST.pdf |
manufacturer |
Extreme Networks, Inc. |
Huawei Technologies Co., Ltd. |
manufacturer_web |
https://www.extremenetworks.com/ |
https://www.huawei.com |
security_level |
{} |
EAL2+, ALC_FLR.2 |
dgst |
84ba1e1261ce36cd |
b91f3f25e268a1e0 |
heuristics/cert_id |
CCEVS-VR-10928-2019 |
2019-32-INF-3664 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:a:huawei:gaussdb_200:6.5.1:*:*:*:*:*:*:*, cpe:2.3:a:huawei:gaussdb_200:6.5.1.5:*:*:*:*:*:*:*, cpe:2.3:a:huawei:gaussdb_200:6.5.1.1:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2020-1811, CVE-2020-1790, CVE-2020-1853 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
7.3.0 |
6.5.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Network Device
- certification_date: 11.01.2019
- evaluation_facility: Gossamer Security Solutions
- expiration_date: 11.01.2021
- id: CCEVS-VR-VID10928
- product: Extreme Networks, Inc. VDX Product Series operating with NOS version 7.3.0aa
- scheme: US
- url: https://www.niap-ccevs.org/product/10928
- vendor: Extreme Networks, Inc.
|
- category: Database management systems
- certification_date: 22.03.2022
- enhanced:
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei GaussDB 200 version 6.5.1 build e3690037
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/805-huawei-gaussdb-200-version-6-5-1-build-e3690037
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
48ac4778e4272298 |
3f6ac99252bbf14e |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088b_pdf.pdf |
pdf_data/cert_filename |
st_vid10928-ci.pdf |
2019-32_Certificado.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10928-2019: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL2: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 2
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20190111134020-05'00'
- /ModDate: D:20190111134020-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181703
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20220310164952+01'00'
- /ModDate: D:20220310164952+01'00'
- /Producer: GPL Ghostscript 9.27
- pdf_file_size_bytes: 847729
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
st_vid10928-vr.pdf |
2019-32-INF-3664.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-10928-2019
- cert_item: Extreme Networks, Inc. 6480 Via Del Oro San Jose, CA 95119 Extreme Networks, Inc. VDX Product Series with NOS Version 7.3.0aa
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 7
- EAL2+: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE: 3
- AGD_OPE.1: 1
- AGD_PRE: 4
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 2
- ALC_FLR.2: 8
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SEL.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_RIP.1: 1
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_REV.1: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FTA:
- FTA_MCS.1: 1
- FTA_TSE.1: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Huawei:
- Huawei: 14
- Huawei Technologies Co: 3
|
pdf_data/report_keywords/eval_facility |
|
- DEKRA:
- DEKRA Testing and Certification: 5
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
- TLS:
- TLS:
- TLS: 3
- TLSv1.1: 1
- TLSv1.2: 2
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20190111132811-05'00'
- /ModDate: D:20190111132811-05'00'
- pdf_file_size_bytes: 486548
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
|
pdf_data/st_filename |
st_vid10928-st.pdf |
2019-32-ST.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 4
- ALC_CMS: 1
- ALC_CMS.1: 5
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 1
- AGD_PRE: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 2
- FCS_COP: 4
- FCS_RBC_EXT.1: 1
- FCS_RBG_EXT: 1
- FCS_SSHS_EXT: 1
- FCS_SSHS_EXT.1: 1
- FCS_TLSC_EXT: 1
- FCS_TLSS_EXT: 1
- FDP:
- FIA:
- FIA_AFL.1: 2
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 1
- FIA_UAU_EXT: 1
- FIA_UIA_EXT: 1
- FIA_UIA_EXT.1: 1
- FPT:
- FPT_APW_EXT: 1
- FPT_SKP_EXT: 1
- FPT_STM_EXT: 1
- FPT_STM_EXT.1: 1
- FPT_TST_EXT: 1
- FPT_TUD_EXT: 1
- FTA:
- FTA_SSL_EXT: 1
- FTA_TAB.1: 1
- FTP:
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 10
- FAU_GEN.2.1: 2
- FAU_MTD.1: 2
- FAU_SEL.1: 10
- FAU_SEL.1.1: 2
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 2
- FDP_ACF.1: 17
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_RIP.1: 10
- FDP_RIP.1.1: 2
- FIA:
- FIA_ATD.1: 16
- FIA_ATD.1.1: 2
- FIA_UAU.1: 9
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID.1: 15
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_USB.1: 5
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 2
- FMT_MSA.3: 11
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_REV.1: 15
- FMT_REV.1.1: 5
- FMT_REV.1.2: 3
- FMT_SMF.1: 14
- FMT_SMF.1.1: 2
- FMT_SMR.1: 21
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITT.1: 1
- FPT_STM.1: 1
- FPT_TRC.1: 11
- FPT_TRC.1.1: 2
- FPT_TRC.1.2: 2
- FTA:
- FTA_MCS.1: 9
- FTA_MCS.1.1: 2
- FTA_MCS.1.2: 2
- FTA_TSE.1: 8
- FTA_TSE.1.1: 2
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
|
- A:
- A.AUTHUSER: 2
- A.CONNECT: 3
- A.MANAGE: 3
- A.NO_GENERA: 1
- A.NO_GENERAL_PURPOSE: 2
- A.PEER_FUNC: 1
- A.PHYSICAL: 3
- A.SUPPORT: 4
- A.TRAINEDUS: 1
- A.TRAINEDUSER: 1
- O:
- O.ADMIN_RO: 3
- O.ADMIN_ROL: 1
- O.ADMIN_ROLE: 7
- O.AUDIT: 2
- O.AUDIT_GE: 2
- O.AUDIT_GENERATION: 3
- O.DISCRETIO: 3
- O.DISCRETIONARY: 1
- O.DISCRETIONARY_ACCESS: 5
- O.MANAGE: 13
- O.MEDIATE: 9
- O.RESIDUAL: 2
- O.RESIDUAL_: 1
- O.RESIDUAL_I: 1
- O.RESIDUAL_INFORM: 1
- O.RESIDUAL_INFORMATION: 6
- O.TOE_ACCE: 8
- O.TOE_ACCES: 1
- O.TOE_ACCESS: 10
- OE:
- OE.ADMIN: 10
- OE.INFO: 5
- OE.INFO_PRO: 4
- OE.INFO_PROTECT: 11
- OE.IT_REMOT: 4
- OE.IT_REMOTE: 6
- OE.IT_TRUST: 4
- OE.IT_TRUSTED: 1
- OE.IT_TRUSTED_SYSTEM: 5
- OE.NO_GENE: 3
- OE.NO_GENERAL: 1
- OE.NO_GENERAL_PURPOSE: 4
- OE.PHYSICAL: 8
- T:
- T.ACCESS_TSF: 2
- T.ACCESS_TSFDATA: 2
- T.ACCESS_TSFFUNC: 1
- T.IA_MASQUE: 2
- T.IA_MASQUERADE: 2
- T.IA_USER: 2
- T.RESIDUAL_: 1
- T.RESIDUAL_DATA: 2
- T.TSF: 1
- T.TSF_COMPR: 1
- T.TSF_COMPROMISE: 1
- T.UNAUTHOR: 2
- T.UNAUTHORIZED_ACCESS: 2
|
pdf_data/st_keywords/vendor |
|
- Huawei:
- Huawei: 9
- Huawei Technologies Co: 87
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC-SHA-256: 3
- HMAC-SHA-512: 3
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-512: 4
- SHA256: 2
- SHA384: 1
- SHA512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- SSL: 3
- SSL 2.0: 1
- SSL 3.0: 1
- TLS:
- TLS: 38
- TLS 1.0: 1
- TLS 1.1: 2
- TLS 1.2: 2
- TLS v1.1: 3
- TLS v1.2: 1
- TLSv1.1: 2
- TLSv1.2: 1
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 186-4: 2
- ISO:
- ISO/IEC 18031:2011: 2
- ISO/IEC 9796-2: 1
- NIST:
- PKCS:
- RFC:
- RFC 2818: 2
- RFC 2986: 1
- RFC 3268: 4
- RFC 3526: 3
- RFC 4253: 1
- RFC 4346: 3
- RFC 5246: 8
- RFC 5280: 2
- RFC 6125: 1
- RFC 6960: 1
- RFC4346: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 1_SLES.tar.gz Clients Clients (including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE. They are used to interact with the TOE. Server Tools Server Tools: 1
- Co., Ltd. 6 Item Requirement ● NeoKylin 7.6 Software The Software of Python v2.7.5 is also out of scope and thus not included in the TOE. JDK v1.8 (server version) FusionInsight_BASE_6.5.1_SLES.tar.gz: 1
- Manager Network channel is also out of scope and thus not included in the TOE. It is used to monitor the status of each node instance in the: 1
- including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE: 1
- is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE. They are used to manager and monitor the TOE. Firewall Used to: 1
- out of scope: 7
- provide the required environment for installing and running the TOE. Data Network channel is also out of scope and thus not included in the TOE. It is used to transmit service data between node instances in a: 1
- this is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE: 1
- with new information. 2.3.3 Non-TOE Hardware and Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: Server hardware and OS are: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20190111131018-05'00'
- /ModDate: D:20190111131018-05'00'
- pdf_file_size_bytes: 1254417
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |