type net.IPNet

22 uses

	net (current package)
		addrselect.go#L217: 	Prefix     *IPNet
		addrselect.go#L294: func mustCIDR(s string) *IPNet {
		interface_bsd.go#L113: 				ifat = append(ifat, &IPNet{IP: ip, Mask: mask})
		ip.go#L41: type IPNet struct {
		ip.go#L475: func networkNumberAndMask(n *IPNet) (ip IP, m IPMask) {
		ip.go#L499: func (n *IPNet) Contains(ip IP) bool {
		ip.go#L517: func (n *IPNet) Network() string { return "ip+net" }
		ip.go#L525: func (n *IPNet) String() string {
		ip.go#L712: func ParseCIDR(s string) (IP, *IPNet, error) {
		ip.go#L729: 	return ip, &IPNet{IP: ip.Mask(m), Mask: m}, nil
		sockopt_posix.go#L39: 			case *IPNet:
		sockopt_posix.go#L66: 		case *IPNet:
		sockopt_posix.go#L90: 		case *IPNet:

	crypto/x509
		verify.go#L461: func matchIPConstraint(ip net.IP, constraint *net.IPNet) (bool, error) {
		verify.go#L683: 						return matchIPConstraint(parsedName.(net.IP), constraint.(*net.IPNet))
		x509.go#L717: 	PermittedIPRanges           []*net.IPNet
		x509.go#L718: 	ExcludedIPRanges            []*net.IPNet
		x509.go#L1168: 	getValues := func(subtrees cryptobyte.String) (dnsNames []string, ips []*net.IPNet, emails, uriDomains []string, err error) {
		x509.go#L1225: 				ips = append(ips, &net.IPNet{IP: net.IP(ip), Mask: net.IPMask(mask)})
		x509.go#L1791: 		ipAndMask := func(ipNet *net.IPNet) []byte {
		x509.go#L1799: 		serialiseConstraints := func(dns []string, ips []*net.IPNet, emails []string, uriDomains []string) (der []byte, err error) {

	vendor/golang.org/x/net/http/httpproxy
		proxy.go#L337: 	cidr *net.IPNet