linuxOS_AP05/debian/test/usr/share/doc/openvpn/examples/sample-keys
2025-09-26 09:40:02 +08:00
..
ca.crt add debian 2025-09-26 09:40:02 +08:00
ca.key add debian 2025-09-26 09:40:02 +08:00
client-ec.crt.gz add debian 2025-09-26 09:40:02 +08:00
client-ec.key add debian 2025-09-26 09:40:02 +08:00
client-pass.key add debian 2025-09-26 09:40:02 +08:00
client.crt.gz add debian 2025-09-26 09:40:02 +08:00
client.key add debian 2025-09-26 09:40:02 +08:00
client.p12.gz add debian 2025-09-26 09:40:02 +08:00
dh2048.pem add debian 2025-09-26 09:40:02 +08:00
gen-sample-keys.sh.gz add debian 2025-09-26 09:40:02 +08:00
openssl.cnf add debian 2025-09-26 09:40:02 +08:00
README add debian 2025-09-26 09:40:02 +08:00
server-ec.crt.gz add debian 2025-09-26 09:40:02 +08:00
server-ec.key add debian 2025-09-26 09:40:02 +08:00
server.crt.gz add debian 2025-09-26 09:40:02 +08:00
server.key add debian 2025-09-26 09:40:02 +08:00
ta.key add debian 2025-09-26 09:40:02 +08:00

Sample RSA and EC keys.

Run ./gen-sample-keys.sh to generate fresh test keys.

See the examples section of the man page for usage examples.

NOTE: THESE KEYS ARE FOR TESTING PURPOSES ONLY.
      DON'T USE THEM FOR ANY REAL WORK BECAUSE
      THEY ARE TOTALLY INSECURE!

ca.{crt,key}        -- sample CA key/cert
server.{crt,key}    -- sample server key/cert
client.{crt,key}    -- sample client key/cert
client-pass.key     -- sample client key with password-encrypted key
                       password = "password"
client.p12          -- sample client pkcs12 bundle
                       password = "password"
client-ec.{crt,key} -- sample elliptic curve client key/cert
server-ec.{crt,key} -- sample elliptic curve server key/cert