User's private key is used for auth only?
If this two users make the exactly same request, and someone is sniffing the data on server, this person (the sniffer) will see the same data for both users or different data?
Different data.
The question is to know if the user's private key interferes in the cryptography AFTER the authentication or if is used only in authentication time.
The public/private keys are only used during authentication/key negotiation.
OpenVPN can operate in one of two modes, a pre-shared key or using TLS with certificates. The pre-shared key is static, constant, but you are asking about the certificate mode.
I'm not going to go into too much detail, and you can look up TLS yourself, but basically TLS uses the certificates (and private keys) for authentication and during the key negotiation phase. It generates a symmetric encryption key (e.g. BlowFish, AES, etc.) and uses public-key cryptography to share that key securely.
Actual messages are then encrypted with symmetric encryption. Each session has its own independent encryption key (so if you disconnect and reconnect you actually end up with a different key). Likewise, every user will have different sessions and therefore different keys.
There are two reasons for doing this. Symmetric encryption is considerably faster than asymmetric encryption, so is preferred for high throughput (the difficulty is key sharing, which the negotiation phase solves). Also, by generating a new key every time, it's harder for compromised keys to reveal other sessions' data (FS).
Each client will crypto his data with the negotiated key between client and server, so the data received on the VPN gateway will be different for both users.