* feat: export/import password protected RSA key
* docs: crypto.key.import
* test: import with wrong password
* fix: lint
* test: importing openssl keys
* just to trigger circle with new ubuntu
* feat: get the RSA key id
* feat: get the ED 25519 key id
* feat: pbkdf2
* fix(pbkdf2): base64 has more chars to guess than hex
* chore: update deps
* test: Add failing tests
* fix: Fix some failing tests
* fix: various fixes on garbage error handling and respective tests
* tests: increased timeout for test timing out in CI
* tests: increasing test timeout to please the CI gods
* tests: increasing test timeout to please the CI gods
* fix: for when unMarshallPrivateKey is called with null or undefined key
Implement generateKeyPairFromSeed for ed25519 - this will produce the same keypair for the same seed (or first 32 bytes of reader) as given to GenerateKeyPairWithReader in go-libp2p.
Due to the design of `AES-CTR` in the webcrypto spec, there
is no streaming mode provided. This results in the counter
not being reused between subsequent calls to `encrypt` or
`decrypt`. As both the node.js and the go implementation rely
on this webcrypto had to be replaced.