type net.IPNet

20 uses

	net (current package)
		interface_linux.go#L195: 			return &IPNet{IP: IPv4(a.Value[0], a.Value[1], a.Value[2], a.Value[3]), Mask: CIDRMask(int(ifam.Prefixlen), 8*IPv4len)}
		interface_linux.go#L197: 			ifa := &IPNet{IP: make(IP, IPv6len), Mask: CIDRMask(int(ifam.Prefixlen), 8*IPv6len)}
		ip.go#L46: type IPNet struct {
		ip.go#L425: func networkNumberAndMask(n *IPNet) (ip IP, m IPMask) {
		ip.go#L449: func (n *IPNet) Contains(ip IP) bool {
		ip.go#L467: func (n *IPNet) Network() string { return "ip+net" }
		ip.go#L475: func (n *IPNet) String() string {
		ip.go#L519: func ParseCIDR(s string) (IP, *IPNet, error) {
		ip.go#L536: 	return IP(addr16[:]), &IPNet{IP: IP(addr16[:]).Mask(m), Mask: m}, nil
		sockopt_posix.go#L37: 		case *IPNet:
		sockopt_posix.go#L61: 		case *IPNet:

	crypto/x509
		parser.go#L539: 	getValues := func(subtrees cryptobyte.String) (dnsNames []string, ips []*net.IPNet, emails, uriDomains []string, err error) {
		parser.go#L596: 				ips = append(ips, &net.IPNet{IP: net.IP(ip), Mask: net.IPMask(mask)})
		verify.go#L448: func matchIPConstraint(ip net.IP, constraint *net.IPNet) (bool, error) {
		verify.go#L668: 							return matchIPConstraint(parsedName.(net.IP), constraint.(*net.IPNet))
		x509.go#L774: 	PermittedIPRanges           []*net.IPNet
		x509.go#L775: 	ExcludedIPRanges            []*net.IPNet
		x509.go#L1219: 		ipAndMask := func(ipNet *net.IPNet) []byte {
		x509.go#L1227: 		serialiseConstraints := func(dns []string, ips []*net.IPNet, emails []string, uriDomains []string) (der []byte, err error) {

	vendor/golang.org/x/net/http/httpproxy
		proxy.go#L339: 	cidr *net.IPNet