type net.IPNet
22 uses
net (current package)
addrselect.go#L217: Prefix *IPNet
addrselect.go#L294: func mustCIDR(s string) *IPNet {
interface_bsd.go#L113: ifat = append(ifat, &IPNet{IP: ip, Mask: mask})
ip.go#L41: type IPNet struct {
ip.go#L475: func networkNumberAndMask(n *IPNet) (ip IP, m IPMask) {
ip.go#L499: func (n *IPNet) Contains(ip IP) bool {
ip.go#L517: func (n *IPNet) Network() string { return "ip+net" }
ip.go#L525: func (n *IPNet) String() string {
ip.go#L712: func ParseCIDR(s string) (IP, *IPNet, error) {
ip.go#L729: return ip, &IPNet{IP: ip.Mask(m), Mask: m}, nil
sockopt_posix.go#L39: case *IPNet:
sockopt_posix.go#L66: case *IPNet:
sockopt_posix.go#L90: case *IPNet:
crypto/x509
verify.go#L461: func matchIPConstraint(ip net.IP, constraint *net.IPNet) (bool, error) {
verify.go#L683: return matchIPConstraint(parsedName.(net.IP), constraint.(*net.IPNet))
x509.go#L717: PermittedIPRanges []*net.IPNet
x509.go#L718: ExcludedIPRanges []*net.IPNet
x509.go#L1168: getValues := func(subtrees cryptobyte.String) (dnsNames []string, ips []*net.IPNet, emails, uriDomains []string, err error) {
x509.go#L1225: ips = append(ips, &net.IPNet{IP: net.IP(ip), Mask: net.IPMask(mask)})
x509.go#L1791: ipAndMask := func(ipNet *net.IPNet) []byte {
x509.go#L1799: serialiseConstraints := func(dns []string, ips []*net.IPNet, emails []string, uriDomains []string) (der []byte, err error) {
vendor/golang.org/x/net/http/httpproxy
proxy.go#L337: cidr *net.IPNet