• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

dnsimple / dns_erlang / 19923208953
84%

Build:
DEFAULT BRANCH: main
Ran 04 Dec 2025 08:57AM UTC
Jobs 1
Files 9
Run time 1min
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

04 Dec 2025 08:56AM UTC coverage: 83.125% (+0.5%) from 82.58%
19923208953

push

github

web-flow
Implement support for ed25519 and ed448 cryptography (#90)

Since we've already added support for ECDSA as in [RFC6605](https://datatracker.ietf.org/doc/rfc6605/), I thought of, well, there are much stronger and efficient elliptic curves out there...

---

Consider the drivers for implementing elliptic-curve cryptography to begin with: for the same security factor, we have way smaller keys, which translates into much smaller network packets, and a couple orders of magnitude performance improvements. So, when the de-facto _standard_ is RSA-3072, this gives us 128bits of entropy and a key size of 388bytes. Now:

| Algorithm | Entropy (bits) | Key Size (bytes) | number of signatures per second |
| :--- | :--- | :--- | :--- |
| RSA | 128 | 388 | 1050 |
| ECDSA-P256 | 128 | 64 | 94020 |
| ECDSA-P384 | 192 | 96 | 10460 |
| Ed25519 | 128 | 32 | 64203 |
| Ed448 | 224 | 56 | 31308 |

Reference:
- [RFC8080](https://datatracker.ietf.org/doc/rfc8080/)
- https://ed25519.no/ and https://ed448.no/
- `openssl speed -seconds 1 rsa3072 ecdsap256 ecdsap384 ed25519 ed448` on my mac M4

Note, [RFC8624](https://datatracker.ietf.org/doc/rfc8624) recommends them, Ed25519 is even declared as a must.

---

For transparency, cursor helped massively. Prompt and summary as generated below, 99% of the code done in less than one minute. Then I took a bit to super carefully clean it up.

PROMPT:
See how in recent commits I've added support for ECDSAP256SHA256 and ECDSAP384SHA384, and now add support, and tests, for ed25519 and ed448 following the definitions from RFC8080.

SUMMARY:

Added support for ed25519 and ed448 DNSSEC algorithms per RFC8080, following the ECDSA implementation pattern.

Changes Made:

1. Algorithm definitions (include/dns_terms.hrl): • Added DNS_ALG_ED25519 (algorithm 15) • Added DNS_ALG_ED448 (algorithm 16)
2. Type definitions: • Updated dns_records.hrl to include ed25519/ed448 in RRSIG alg types • Updated dns.erl to include ed25519/ed448 in alg type • Update... (continued)

16 of 24 new or added lines in 4 files covered. (66.67%)

63 existing lines in 5 files now uncovered.

1798 of 2163 relevant lines covered (83.13%)

1240.37 hits per line

New Missed Lines in Diff

Lines Coverage ∆ File
1
99.06
-0.22% src/dns_names.erl
2
80.52
-0.43% src/dns_encode.erl
5
72.99
2.12% src/dnssec.erl

Uncovered Existing Lines

Lines Coverage ∆ File
2
99.06
-0.22% src/dns_names.erl
3
93.22
0.21% src/dns_decode.erl
5
90.35
0.0% src/dns.erl
8
80.52
-0.43% src/dns_encode.erl
45
72.99
2.12% src/dnssec.erl
Jobs
ID Job ID Ran Files Coverage
1 19923208953.1 04 Dec 2025 08:57AM UTC 9
83.13
GitHub Action Run
Source Files on build 19923208953
  • Tree
  • List 9
  • Changed 5
  • Source Changed 5
  • Coverage Changed 5
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Repo
  • Github Actions Build #19923208953
  • c82d6721 on github
  • Prev Build on main (#19856431760)
  • Next Build on main (#19923263948)
  • Delete
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc