openvpn/sample/sample-keys
Frank Lichtenheld 022f0a4387 Update copyright statements to 2025
Change-Id: I3dfead8e60da93f223e3333db7b8e01ead01a856
Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
Acked-by: Gert Doering <gert@greenie.muc.de>
Message-Id: <20250531203546.26593-1-gert@greenie.muc.de>
URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg31826.html
Signed-off-by: Gert Doering <gert@greenie.muc.de>
2025-05-31 22:38:38 +02:00
..
ca.crt sample-keys: renew for the next 10 years 2023-11-21 12:34:57 +01:00
ca.key sample-keys: renew for the next 10 years 2023-11-21 12:34:57 +01:00
client-ec.crt sample-keys: renew for the next 10 years 2023-11-21 12:34:57 +01:00
client-ec.key sample-keys: renew for the next 10 years 2023-11-21 12:34:57 +01:00
client-pass.key sample-keys: renew for the next 10 years 2023-11-21 12:34:57 +01:00
client.crt sample-keys: renew for the next 10 years 2023-11-21 12:34:57 +01:00
client.key sample-keys: renew for the next 10 years 2023-11-21 12:34:57 +01:00
client.p12 sample-keys: renew for the next 10 years 2023-11-21 12:34:57 +01:00
dh2048.pem sample-keys: renew for the next 10 years 2023-11-21 12:34:57 +01:00
gen-sample-keys.sh Update copyright statements to 2025 2025-05-31 22:38:38 +02:00
openssl.cnf Fix various spelling mistakes 2019-02-06 19:07:34 +01:00
README Modernize sample keys and sample configs 2014-11-15 17:45:10 +01:00
server-ec.crt sample-keys: renew for the next 10 years 2023-11-21 12:34:57 +01:00
server-ec.key sample-keys: renew for the next 10 years 2023-11-21 12:34:57 +01:00
server.crt sample-keys: renew for the next 10 years 2023-11-21 12:34:57 +01:00
server.key sample-keys: renew for the next 10 years 2023-11-21 12:34:57 +01:00
ta.key sample-keys: renew for the next 10 years 2023-11-21 12:34:57 +01:00

Sample RSA and EC keys.

Run ./gen-sample-keys.sh to generate fresh test keys.

See the examples section of the man page for usage examples.

NOTE: THESE KEYS ARE FOR TESTING PURPOSES ONLY.
      DON'T USE THEM FOR ANY REAL WORK BECAUSE
      THEY ARE TOTALLY INSECURE!

ca.{crt,key}        -- sample CA key/cert
server.{crt,key}    -- sample server key/cert
client.{crt,key}    -- sample client key/cert
client-pass.key     -- sample client key with password-encrypted key
                       password = "password"
client.p12          -- sample client pkcs12 bundle
                       password = "password"
client-ec.{crt,key} -- sample elliptic curve client key/cert
server-ec.{crt,key} -- sample elliptic curve server key/cert