var crypto/x509.anyPolicyOID
16 uses
crypto/x509 (current package)
verify.go#L1294: var anyPolicyOID = mustNewOIDFromInts([]uint64{2, 5, 29, 32, 0})
verify.go#L1298: validPolicy: anyPolicyOID,
verify.go#L1299: expectedPolicySet: []OID{anyPolicyOID},
verify.go#L1305: strata: []map[string]*policyGraphNode{{string(anyPolicyOID.der): &root}},
verify.go#L1324: return pg.strata[pg.depth-1][string(anyPolicyOID.der)]
verify.go#L1360: if n.validPolicy.Equal(anyPolicyOID) {
verify.go#L1366: if p.validPolicy.Equal(anyPolicyOID) {
verify.go#L1438: initialUserPolicySet[string(anyPolicyOID.der)] = true
verify.go#L1465: if policy.Equal(anyPolicyOID) {
verify.go#L1487: if policies[string(anyPolicyOID.der)] && (inhibitAnyPolicy > 0 || (n-i < n && isSelfSigned)) {
verify.go#L1514: if mapping.IssuerDomainPolicy.Equal(anyPolicyOID) || mapping.SubjectDomainPolicy.Equal(anyPolicyOID) {
verify.go#L1532: } else if matching := pg.leafWithPolicy(anyPolicyOID); matching != nil {
verify.go#L1587: if currentAny := pg.leafWithPolicy(anyPolicyOID); currentAny != nil {
verify.go#L1600: if len(initialUserPolicySet) != 1 || !initialUserPolicySet[string(anyPolicyOID.der)] {
verify.go#L1608: if authorityConstrainedPolicySet[string(anyPolicyOID.der)] {
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)