if (i < buflen) {
switch(ival = bytes[i++]) {
case '0':
// ignore leading zeroes
break; // switch
case '1': case '2': case '3': case '4':
case '5': case '6': case '7': case '8': case '9':
chars[offset++] = (char)ival;
lastValidOffset = offset;
break; // switch
case '.':
state = SDECDIGIT;
break states;
default:
state = SCOMPLETE;
break states;
} // switch
}
switch(ival = bytes[i++]) {
case '0': case '1': case '2': case '3': case '4':
case '5': case '6': case '7': case '8': case '9':
chars[offset++] = (char)ival;
lastValidOffset = offset;
break; //switch
default:
state = SERR_NOT_STRICT;
break states;
}
Clone fragments detected by clone detection tool
File path: /jruby-1.4.0/src/org/jruby/util/Convert.java
|
|
File path: /jruby-1.4.0/src/org/jruby/util/Convert.java
|
Method name: double byteArrayToDouble(byte[], int, int, boolean)
|
|
Method name: double byteArrayToDouble(byte[], int, int, boolean)
|
Number of AST nodes: 22
|
|
Number of AST nodes: 17
|
|
1 | if (i < buflen) {↵ | | |
|
2 | switch(ival = bytes[i++]) {↵ | | 1 | switch(ival = bytes[i++]) {↵
|
3 | case '0':↵ | | 2 | case '0':↵
|
4 | // ignore leading zeroes↵ | | |
|
5 | break; // switch↵ | | |
|
6 | case '1': case '2': case '3': case '4':↵ | | 3 | case '1': case '2': case '3': case '4':↵
|
7 | case '5': case '6': case '7': case '8': case '9':↵ | | 4 | case '5': case '6': case '7': case '8': case '9':↵
|
8 | chars[offset++] = (char)ival;↵ | | 5 | chars[offset++] = (char)ival;↵
|
9 | lastValidOffset = offset;↵ | | 6 | lastValidOffset = offset;↵
|
10 | break; // switch↵ | | 7 | break; //switch↵
|
11 | case '.':↵ | | |
|
12 | state = SDECDIGIT;↵ | | |
|
13 | break states;↵ | | |
|
14 | default:↵ | | 8 | default:↵
|
15 | state = SCOMPLETE;↵ | | 9 | state = SERR_NOT_STRICT;↵
|
16 | break states;↵ | | 10 | break states;↵
|
17 | } // switch↵ | | 11 | }
|
18 | } | | | |
See real code fragment |
|
See real code fragment |
Summary
Number of common nesting structure subtrees | 1 |
Number of refactorable cases | 0 |
Number of non-refactorable cases | 1 |
Time elapsed for finding largest common nesting structure subtrees (ms) | 0.7 |
Clones location | Clones are in the same method |
Number of node comparisons | 145 |
-
{Non-refactorable}
Mapping Summary
Number of mapped statements | 17 |
Number of unmapped statements in the first code fragment | 4 |
Number of unmapped statements in the second code fragment | 0 |
Time elapsed for statement mapping (ms) | 13.8 |
Clone type | Type 3 |
Mapped Statements
ID |
Statement |
|
ID |
Statement |
466 | switch (ival = bytes[i++]) | | 725 | switch (ival = bytes[i++]) |
467 | | | 735 | |
468 | | | 738 | |
469 | | | 727 | |
470 | | | 728 | |
471 | | | 729 | |
472 | | | 730 | |
473 | | | 731 | |
474 | | | 732 | |
475 | | | 733 | |
476 | | | 734 | |
477 | | | 726 | |
478 | chars[offset++] = (char)ival; | | 736 | chars[offset++] = (char)ival; |
479 | lastValidOffset = offset; | | 737 | lastValidOffset = offset; |
480 | | | | |
481 | | | | |
482 | | | 740 | |
483 | | | 741 | |
484 | | | 739 | |
485 | | | | |
486 | | | | |
Precondition Violations (3)
Row |
Violation |
1 | Unmatched break; |
2 | Unmatched break states; |
3 | Clone fragment #1 returns variables i, ival, offset, chars, lastValidOffset , while Clone fragment #2 returns variables i, ival, offset, chars, lastValidOffset |