var crypto/x509.anyPolicyOID

16 uses

	crypto/x509 (current package)
		verify.go#L1338: var anyPolicyOID = mustNewOIDFromInts([]uint64{2, 5, 29, 32, 0})
		verify.go#L1342: 		validPolicy:       anyPolicyOID,
		verify.go#L1343: 		expectedPolicySet: []OID{anyPolicyOID},
		verify.go#L1349: 		strata: []map[string]*policyGraphNode{{string(anyPolicyOID.der): &root}},
		verify.go#L1368: 	return pg.strata[pg.depth-1][string(anyPolicyOID.der)]
		verify.go#L1404: 			if n.validPolicy.Equal(anyPolicyOID) {
		verify.go#L1410: 					if p.validPolicy.Equal(anyPolicyOID) {
		verify.go#L1482: 		initialUserPolicySet[string(anyPolicyOID.der)] = true
		verify.go#L1509: 				if policy.Equal(anyPolicyOID) {
		verify.go#L1531: 			if policies[string(anyPolicyOID.der)] && (inhibitAnyPolicy > 0 || (n-i < n && isSelfSigned)) {
		verify.go#L1558: 							if mapping.IssuerDomainPolicy.Equal(anyPolicyOID) || mapping.SubjectDomainPolicy.Equal(anyPolicyOID) {
		verify.go#L1576: 						} else if matching := pg.leafWithPolicy(anyPolicyOID); matching != nil {
		verify.go#L1631: 		if currentAny := pg.leafWithPolicy(anyPolicyOID); currentAny != nil {
		verify.go#L1644: 	if len(initialUserPolicySet) != 1 || !initialUserPolicySet[string(anyPolicyOID.der)] {
		verify.go#L1652: 		if authorityConstrainedPolicySet[string(anyPolicyOID.der)] {