type net.IPNet
28 uses
net (current package)
addrselect.go#L217: Prefix *IPNet
addrselect.go#L294: func mustCIDR(s string) *IPNet {
interface_linux.go#L192: return &IPNet{IP: IPv4(a.Value[0], a.Value[1], a.Value[2], a.Value[3]), Mask: CIDRMask(int(ifam.Prefixlen), 8*IPv4len)}
interface_linux.go#L194: ifa := &IPNet{IP: make(IP, IPv6len), Mask: CIDRMask(int(ifam.Prefixlen), 8*IPv6len)}
ip.go#L44: type IPNet struct {
ip.go#L497: func networkNumberAndMask(n *IPNet) (ip IP, m IPMask) {
ip.go#L521: func (n *IPNet) Contains(ip IP) bool {
ip.go#L539: func (n *IPNet) Network() string { return "ip+net" }
ip.go#L547: func (n *IPNet) String() string {
ip.go#L741: func ParseCIDR(s string) (IP, *IPNet, error) {
ip.go#L758: return ip, &IPNet{IP: ip.Mask(m), Mask: m}, nil
sockopt_posix.go#L39: case *IPNet:
sockopt_posix.go#L66: case *IPNet:
sockopt_posix.go#L90: case *IPNet:
crypto/x509
parser.go#L531: getValues := func(subtrees cryptobyte.String) (dnsNames []string, ips []*net.IPNet, emails, uriDomains []string, err error) {
parser.go#L588: ips = append(ips, &net.IPNet{IP: net.IP(ip), Mask: net.IPMask(mask)})
verify.go#L438: func matchIPConstraint(ip net.IP, constraint *net.IPNet) (bool, error) {
verify.go#L653: return matchIPConstraint(parsedName.(net.IP), constraint.(*net.IPNet))
x509.go#L716: PermittedIPRanges []*net.IPNet
x509.go#L717: ExcludedIPRanges []*net.IPNet
x509.go#L1137: ipAndMask := func(ipNet *net.IPNet) []byte {
x509.go#L1145: serialiseConstraints := func(dns []string, ips []*net.IPNet, emails []string, uriDomains []string) (der []byte, err error) {
github.com/go-pg/pg/v10/orm
table.go#L43: ipNetType = reflect.TypeOf((*net.IPNet)(nil)).Elem()
github.com/go-pg/pg/v10/types
append_value.go#L226: ipnet := v.Interface().(net.IPNet)
scan_value.go#L22: ipNetType = reflect.TypeOf((*net.IPNet)(nil)).Elem()
scan_value.go#L297: var zeroIPNetValue = reflect.ValueOf(net.IPNet{})
scan_value.go#L315: ptr := v.Addr().Interface().(*net.IPNet)
vendor/golang.org/x/net/http/httpproxy
proxy.go#L337: cidr *net.IPNet