var crypto/x509.anyPolicyOID

16 uses

	crypto/x509 (current package)
		verify.go#L1294: var anyPolicyOID = mustNewOIDFromInts([]uint64{2, 5, 29, 32, 0})
		verify.go#L1298: 		validPolicy:       anyPolicyOID,
		verify.go#L1299: 		expectedPolicySet: []OID{anyPolicyOID},
		verify.go#L1305: 		strata: []map[string]*policyGraphNode{{string(anyPolicyOID.der): &root}},
		verify.go#L1324: 	return pg.strata[pg.depth-1][string(anyPolicyOID.der)]
		verify.go#L1360: 			if n.validPolicy.Equal(anyPolicyOID) {
		verify.go#L1366: 					if p.validPolicy.Equal(anyPolicyOID) {
		verify.go#L1438: 		initialUserPolicySet[string(anyPolicyOID.der)] = true
		verify.go#L1465: 				if policy.Equal(anyPolicyOID) {
		verify.go#L1487: 			if policies[string(anyPolicyOID.der)] && (inhibitAnyPolicy > 0 || (n-i < n && isSelfSigned)) {
		verify.go#L1514: 							if mapping.IssuerDomainPolicy.Equal(anyPolicyOID) || mapping.SubjectDomainPolicy.Equal(anyPolicyOID) {
		verify.go#L1532: 						} else if matching := pg.leafWithPolicy(anyPolicyOID); matching != nil {
		verify.go#L1587: 		if currentAny := pg.leafWithPolicy(anyPolicyOID); currentAny != nil {
		verify.go#L1600: 	if len(initialUserPolicySet) != 1 || !initialUserPolicySet[string(anyPolicyOID.der)] {
		verify.go#L1608: 		if authorityConstrainedPolicySet[string(anyPolicyOID.der)] {