Evaluating a system requires knowledge of that system. A VPN is a specific system and are the clients who connect to that system. One vendor's VPN is not the same another's VPM. One vendors client is not the same as another's client.
Please post all system details (@munkeHoller mentioned above) if you want help.
In that case, you can easily see on the openvpn.net website that OpenVPN uses openssl for key exchanges. So, the key transfer process is encrypted if you follow their tutorial.
There exist NO mathematical encryption method which cannot be compromised given enough time, resources and motivation.
I doubt @anon16652331 that you have a legitimate data confidentiality concern which we can address here in a public forum.
For example, I do not worry about if SSL can be broken "somehow".
If SSL was so "dangerous" the entire Internet would be at risk since it basically "runs" on SSL.
Furthermore, if SSL is "good enough" for every bank and brokerage in the world, with billions of dollars (maybe trillions) over SSL each day, the obviously it should be "more than good enough" for any legitimate activity you, @anon16652331 are doing.
Also, because SSL is so pervasive and important, the security of SSL is constantly being improved by the global user community at large. Obviously, the entire world uses SSL, so of course it must be working as designed. When bugs are found in any software implementation, they are squashed; and there are countless people always trying to make a name for themselves hacking around looking for vulnerabilities.
I have closed this topic for the reason above. If you want to start a new topic on a particular vulnerabilities of SSL @anon16652331, you will need to open a new topic and explain what data you need to protect so much, why you need to protect it so much, and who you feel is trying to get access to your data.