Fork me on GitHub

JavaNCSS Metric Results

[ package ] [ object ] [ method ] [ explanation ]

The following document contains the results of a JavaNCSS metric analysis, using JavaNCSS version 32.53.
JavaNCSS web site.

Packages

[ package ] [ object ] [ method ] [ explanation ]

Packages sorted by NCSS.

Package Classes Methods NCSS Javadocs Javadoc lines Single lines comment Multi lines comment
org.owasp.dependencycheck.analyzer 23 172 2227 190 1283 148 652
org.owasp.dependencycheck.jaxb.pom.generated 86 540 1771 626 7069 228 0
org.owasp.dependencycheck.dependency 14 176 807 173 1097 17 231
org.owasp.dependencycheck.data.nvdcve 9 61 798 68 413 31 281
org.owasp.dependencycheck.utils 11 48 383 46 288 6 172
org.owasp.dependencycheck.suppression 6 52 379 58 362 5 154
org.owasp.dependencycheck.data.update.xml 4 35 316 34 222 5 127
org.owasp.dependencycheck.agent 1 66 298 67 455 0 35
org.owasp.dependencycheck.data.update 6 34 271 39 266 5 128
org.owasp.dependencycheck.data.lucene 11 30 265 41 259 20 231
org.owasp.dependencycheck 1 22 223 22 127 6 45
org.owasp.dependencycheck.data.cpe 4 30 206 32 218 0 102
org.owasp.dependencycheck.data.update.task 2 17 171 18 132 0 60
org.owasp.dependencycheck.reporting 3 14 159 17 118 2 91
org.owasp.dependencycheck.data.nexus 2 15 106 17 108 11 53
org.owasp.dependencycheck.data.nuget 4 21 92 23 134 0 85
org.owasp.dependencycheck.data.cwe 2 5 48 6 29 1 53
org.owasp.dependencycheck.exception 2 8 25 10 48 0 50
org.owasp.dependencycheck.analyzer.exception 2 8 23 10 48 0 51
org.owasp.dependencycheck.data.update.exception 2 6 20 8 40 0 50
org.owasp.dependencycheck.jaxb.pom 1 4 19 5 39 0 30
Classes total Methods total NCSS total Javadocs Javadoc lines Single lines comment Multi lines comment
196 1364 8607 1510 12755 485 2681

Objects

[ package ] [ object ] [ method ] [ explanation ]

TOP 30 classes containing the most NCSS.

Object NCSS Methods Classes Javadocs
org.owasp.dependencycheck.analyzer.JarAnalyzer 623 30 1 36
org.owasp.dependencycheck.data.nvdcve.CveDB 406 20 0 21
org.owasp.dependencycheck.agent.DependencyCheckScanAgent 281 66 0 67
org.owasp.dependencycheck.analyzer.CPEAnalyzer 261 17 2 30
org.owasp.dependencycheck.jaxb.pom.generated.Model 217 60 11 83
org.owasp.dependencycheck.analyzer.ArchiveAnalyzer 211 12 0 13
org.owasp.dependencycheck.data.update.xml.NvdCve20Handler 209 8 1 24
org.owasp.dependencycheck.dependency.Dependency 199 50 0 51
org.owasp.dependencycheck.Engine 194 22 0 22
org.owasp.dependencycheck.jaxb.pom.generated.ObjectFactory 175 87 0 88
org.owasp.dependencycheck.analyzer.FalsePositiveAnalyzer 163 12 0 13
org.owasp.dependencycheck.suppression.SuppressionRule 160 28 0 29
org.owasp.dependencycheck.analyzer.DependencyBundlingAnalyzer 157 11 0 12
org.owasp.dependencycheck.data.nvdcve.ConnectionFactory 151 9 0 10
org.owasp.dependencycheck.data.update.StandardUpdate 143 8 0 9
org.owasp.dependencycheck.analyzer.AssemblyAnalyzer 134 8 0 8
org.owasp.dependencycheck.dependency.EvidenceCollection 128 19 5 20
org.owasp.dependencycheck.dependency.VulnerableSoftware 117 19 0 20
org.owasp.dependencycheck.dependency.Vulnerability 108 36 0 35
org.owasp.dependencycheck.data.cpe.CpeMemoryIndex 107 14 0 15
org.owasp.dependencycheck.dependency.Evidence 102 21 0 22
org.owasp.dependencycheck.jaxb.pom.generated.Build 101 28 5 39
org.owasp.dependencycheck.jaxb.pom.generated.Profile 97 24 6 37
org.owasp.dependencycheck.utils.DependencyVersion 91 11 0 11
org.owasp.dependencycheck.reporting.ReportGenerator 88 6 1 7
org.owasp.dependencycheck.data.update.xml.NvdCve12Handler 80 3 1 10
org.owasp.dependencycheck.data.update.task.DownloadTask 75 11 0 11
org.owasp.dependencycheck.jaxb.pom.generated.Plugin 70 18 4 27
org.owasp.dependencycheck.jaxb.pom.generated.BuildBase 65 16 4 25
org.owasp.dependencycheck.analyzer.AbstractSuppressionAnalyzer 63 6 0 7

TOP 30 classes containing the most methods.

Object NCSS Methods Classes Javadocs
org.owasp.dependencycheck.jaxb.pom.generated.ObjectFactory 175 87 0 88
org.owasp.dependencycheck.agent.DependencyCheckScanAgent 281 66 0 67
org.owasp.dependencycheck.jaxb.pom.generated.Model 217 60 11 83
org.owasp.dependencycheck.dependency.Dependency 199 50 0 51
org.owasp.dependencycheck.dependency.Vulnerability 108 36 0 35
org.owasp.dependencycheck.analyzer.JarAnalyzer 623 30 1 36
org.owasp.dependencycheck.jaxb.pom.generated.Build 101 28 5 39
org.owasp.dependencycheck.suppression.SuppressionRule 160 28 0 29
org.owasp.dependencycheck.jaxb.pom.generated.Profile 97 24 6 37
org.owasp.dependencycheck.Engine 194 22 0 22
org.owasp.dependencycheck.dependency.Evidence 102 21 0 22
org.owasp.dependencycheck.data.nvdcve.CveDB 406 20 0 21
org.owasp.dependencycheck.dependency.EvidenceCollection 128 19 5 20
org.owasp.dependencycheck.dependency.VulnerableSoftware 117 19 0 20
org.owasp.dependencycheck.jaxb.pom.generated.Dependency 52 18 1 21
org.owasp.dependencycheck.jaxb.pom.generated.Developer 58 18 2 23
org.owasp.dependencycheck.jaxb.pom.generated.Plugin 70 18 4 27
org.owasp.dependencycheck.analyzer.CPEAnalyzer 261 17 2 30
org.owasp.dependencycheck.data.update.xml.NvdCve20Handler.Element 51 17 0 17
org.owasp.dependencycheck.dependency.Identifier 55 16 0 15
org.owasp.dependencycheck.jaxb.pom.generated.BuildBase 65 16 4 25
org.owasp.dependencycheck.jaxb.pom.generated.Contributor 53 16 2 21
org.owasp.dependencycheck.data.nuget.NugetPackage 48 15 0 14
org.owasp.dependencycheck.data.cpe.CpeMemoryIndex 107 14 0 15
org.owasp.dependencycheck.jaxb.pom.generated.Notifier 42 14 1 17
org.owasp.dependencycheck.analyzer.AbstractFileTypeAnalyzer 50 13 0 14
org.owasp.dependencycheck.analyzer.ArchiveAnalyzer 211 12 0 13
org.owasp.dependencycheck.analyzer.FalsePositiveAnalyzer 163 12 0 13
org.owasp.dependencycheck.data.cpe.IndexEntry 48 12 0 11
org.owasp.dependencycheck.data.nexus.MavenArtifact 33 12 0 13

Averages.

NCSS average Program NCSS Classes average Methods average Javadocs average
40.49 8,607.00 0.32 6.96 8.15

Methods

[ package ] [ object ] [ method ] [ explanation ]

TOP 30 Methods containing the most NCSS.

Methods NCSS CCN Javadocs
org.owasp.dependencycheck.analyzer.JarAnalyzer.parseManifest(Dependency,ClassNameInformation) 118 45 1
org.owasp.dependencycheck.data.nvdcve.CveDB.updateVulnerability(Vulnerability) 116 17 1
org.owasp.dependencycheck.analyzer.JarAnalyzer.setPomEvidence(Dependency,Model,Properties,ClassNameInformation) 87 47 1
org.owasp.dependencycheck.data.update.xml.NvdCve20Handler.endElement(String,String,String) 71 27 0
org.owasp.dependencycheck.data.update.StandardUpdate.update() 62 25 1
org.owasp.dependencycheck.data.nvdcve.ConnectionFactory.initialize() 60 25 1
org.owasp.dependencycheck.analyzer.AssemblyAnalyzer.initializeFileTypeAnalyzer() 55 20 1
org.owasp.dependencycheck.data.update.xml.NvdCve20Handler.startElement(String,String,String,Attributes) 55 21 0
org.owasp.dependencycheck.data.nvdcve.CveDB.getVulnerability(String) 54 9 1
org.owasp.dependencycheck.utils.ExtractionUtil.extractFiles(File,File,Engine) 51 23 1
org.owasp.dependencycheck.agent.DependencyCheckScanAgent.populateSettings() 49 38 1
org.owasp.dependencycheck.analyzer.ArchiveAnalyzer.extractArchive(ArchiveInputStream,File,Engine) 49 23 1
org.owasp.dependencycheck.analyzer.AssemblyAnalyzer.analyzeFileType(Dependency,Engine) 49 24 1
org.owasp.dependencycheck.analyzer.JarAnalyzer.extractPom(String,JarFile,Dependency) 49 9 1
org.owasp.dependencycheck.suppression.SuppressionRule.process(Dependency) 49 30 1
org.owasp.dependencycheck.analyzer.AbstractSuppressionAnalyzer.loadSuppressionData() 47 17 1
org.owasp.dependencycheck.analyzer.CPEAnalyzer.determineIdentifiers(Dependency,String,String) 47 22 1
org.owasp.dependencycheck.Engine.analyzeDependencies() 47 14 1
org.owasp.dependencycheck.analyzer.ArchiveAnalyzer.analyzeFileType(Dependency,Engine) 44 12 1
org.owasp.dependencycheck.analyzer.JarAnalyzer.analyzePOM(Dependency,ClassNameInformation,Engine) 42 11 1
org.owasp.dependencycheck.data.update.StandardUpdate.updatesNeeded() 42 17 1
org.owasp.dependencycheck.reporting.ReportGenerator.generateReport(String,String) 41 16 1
org.owasp.dependencycheck.analyzer.JarAnalyzer.addDescription(Dependency,String,String,String) 40 11 1
org.owasp.dependencycheck.data.update.xml.NvdCve12Handler.startElement(String,String,String,Attributes) 40 14 0
org.owasp.dependencycheck.analyzer.FalsePositiveAnalyzer.removeSpuriousCPE(Dependency) 35 18 1
org.owasp.dependencycheck.dependency.Dependency.equals(Object) 35 53 1
org.owasp.dependencycheck.dependency.VulnerableSoftware.compareTo(VulnerableSoftware) 34 19 1
org.owasp.dependencycheck.analyzer.ArchiveAnalyzer.extractFiles(File,File,Engine) 32 14 1
org.owasp.dependencycheck.utils.DependencyVersion.compareTo(DependencyVersion) 32 19 0
org.owasp.dependencycheck.suppression.SuppressionRule.toString() 31 16 1

Averages.

Program NCSS NCSS average CCN average Javadocs average
8,607.00 4.85 2.35 0.97

Explanations

[ package ] [ object ] [ method ] [ explanation ]

Non Commenting Source Statements (NCSS)

Statements for JavaNCSS are not statements as specified in the Java Language Specification but include all kinds of declarations too. Roughly spoken, NCSS is approximately equivalent to counting ';' and '{' characters in Java source files.

Not counted are empty statements, empty blocks or semicolons after closing brackets. Of course, comments don't get counted too. Closing brackets also never get counted, the same applies to blocks in general.

Examples
Package declaration package java.lang;
Import declaration import java.awt.*;
Class declaration
  • public class Foo {
  • public class Foo extends Bla {
Interface declaration public interface Able ; {
Field declaration
  • int a;
  • int a, b, c = 5, d = 6;
Method declaration
  • public void cry();
  • public void gib() throws DeadException {
Constructor declaration public Foo() {
Constructor invocation
  • this();
  • super();
Statement declaration
  • i = 0;
  • if (ok)
  • if (exit) {
  • if (3 == 4);
  • if (4 == 4) { ;
  • } else {
Label declaration fine :

In some cases consecutive semicolons are illegal according to the JLS but JavaNCSS still tolerates them (thought JavaNCSS is still more strict as 'javac'). Nevertheless they are never counted as two statements.

Cyclomatic Complexity Number (CCN)

CCN is also know as McCabe Metric. There exists a much hyped theory behind it based on graph theory, but it all comes down to simply counting 'if', 'for', 'while' statements etc. in a method. Whenever the control flow of a method splits, the "CCN counter" gets incremented by one.

Each method has a minimum value of 1 per default. For each of the following Java keywords/statements this value gets incremented by one:

  • if
  • for
  • while
  • case
  • catch

Also if the control flow of a method returns abortively the CCNvalue will be incremented by one:

  • if
  • for

An ordinary return at the end of method will not be counted.

Note that 'else', 'default', and 'finally' don't increment the CCN value any further. On the other hand, a simple method with a 'switch' statement and a huge block of 'case' statements can have a surprisingly high CCN value (still it has the same value when converting a 'switch' block to an equivalent sequence of 'if' statements).