type net.IPNet

23 uses

	net (current package)
		interface_linux.go#L195: 			return &IPNet{IP: IPv4(a.Value[0], a.Value[1], a.Value[2], a.Value[3]), Mask: CIDRMask(int(ifam.Prefixlen), 8*IPv4len)}
		interface_linux.go#L197: 			ifa := &IPNet{IP: make(IP, IPv6len), Mask: CIDRMask(int(ifam.Prefixlen), 8*IPv6len)}
		ip.go#L45: type IPNet struct {
		ip.go#L424: func networkNumberAndMask(n *IPNet) (ip IP, m IPMask) {
		ip.go#L448: func (n *IPNet) Contains(ip IP) bool {
		ip.go#L466: func (n *IPNet) Network() string { return "ip+net" }
		ip.go#L474: func (n *IPNet) String() string {
		ip.go#L517: func ParseCIDR(s string) (IP, *IPNet, error) {
		ip.go#L535: 	return IP(addr16[:]), &IPNet{IP: IP(addr16[:]).Mask(m), Mask: m}, nil
		sockopt_posix.go#L39: 			case *IPNet:
		sockopt_posix.go#L66: 		case *IPNet:
		sockopt_posix.go#L90: 		case *IPNet:

	crypto/x509
		parser.go#L518: 	getValues := func(subtrees cryptobyte.String) (dnsNames []string, ips []*net.IPNet, emails, uriDomains []string, err error) {
		parser.go#L575: 				ips = append(ips, &net.IPNet{IP: net.IP(ip), Mask: net.IPMask(mask)})
		verify.go#L440: func matchIPConstraint(ip net.IP, constraint *net.IPNet) (bool, error) {
		verify.go#L660: 							return matchIPConstraint(parsedName.(net.IP), constraint.(*net.IPNet))
		x509.go#L765: 	PermittedIPRanges           []*net.IPNet
		x509.go#L766: 	ExcludedIPRanges            []*net.IPNet
		x509.go#L1197: 		ipAndMask := func(ipNet *net.IPNet) []byte {
		x509.go#L1205: 		serialiseConstraints := func(dns []string, ips []*net.IPNet, emails []string, uriDomains []string) (der []byte, err error) {

	golang.org/x/net/proxy
		per_host.go#L18: 	bypassNetworks []*net.IPNet
		per_host.go#L133: func (p *PerHost) AddNetwork(net *net.IPNet) {

	vendor/golang.org/x/net/http/httpproxy
		proxy.go#L339: 	cidr *net.IPNet