tmpnam, tmpnam_r - create a name for a temporary file


   #include <stdio.h>

   char *tmpnam(char *s);
   char *tmpnam_r(char *s);

   Feature Test Macro Requirements for glibc (see feature_test_macros(7)):

       Since glibc 2.19:
       Up to and including glibc 2.19:
           _BSD_SOURCE || _SVID_SOURCE


   Note:  avoid  using  these  functions;  use  mkstemp(3)  or  tmpfile(3)

   The tmpnam() function returns a pointer to a string  that  is  a  valid
   filename,  and  such  that  a file with this name did not exist at some
   point in time, so that naive programmers may think it a  suitable  name
   for  a  temporary  file.   If  the  argument  s  is  NULL, this name is
   generated in an internal static buffer and may be  overwritten  by  the
   next  call  to  tmpnam().   If s is not NULL, the name is copied to the
   character array (of length at least L_tmpnam) pointed to by s  and  the
   value s is returned in case of success.

   The  created  pathname has a directory prefix P_tmpdir.  (Both L_tmpnam
   and P_tmpdir are defined in <stdio.h>, just like the TMP_MAX  mentioned

   The tmpnam_r() function performs the same task as tmpnam(), but returns
   NULL (to indicate an error) if s is NULL.


   These functions return a pointer to a  unique  temporary  filename,  or
   NULL if a unique name cannot be generated.


   No errors are defined.


   For   an   explanation   of   the  terms  used  in  this  section,  see

   Interface   Attribute      Value                    
   tmpnam()    Thread safety  MT-Unsafe race:tmpnam/!s 
   tmpnam_r()  Thread safety  MT-Safe                  


   tmpnam(): SVr4, 4.3BSD, C89,  C99,  POSIX.1-2001.   POSIX.1-2008  marks
   tmpnam() as obsolete.

   tmpnam_r()  is  a nonstandard extension that is also available on a few
   other systems.


   The tmpnam() function generates a different  string  each  time  it  is
   called,  up to TMP_MAX times.  If it is called more than TMP_MAX times,
   the behavior is implementation defined.

   Although these functions generate names that are difficult to guess, it
   is  nevertheless  possible  that  between the time that the pathname is
   returned and the time that the program opens it, another program  might
   create  that  pathname  using open(2), or create it as a symbolic link.
   This can lead to security holes.  To avoid such possibilities, use  the
   open(2)  O_EXCL  flag  to  open  the  pathname.   Or  better  yet,  use
   mkstemp(3) or tmpfile(3).

   Portable applications that use threads cannot call tmpnam() with a NULL
   argument  if  either  _POSIX_THREADS or _POSIX_THREAD_SAFE_FUNCTIONS is


   Never use these functions.  Use mkstemp(3) or tmpfile(3) instead.


   mkstemp(3), mktemp(3), tempnam(3), tmpfile(3)


   This page is part of release 4.09 of the Linux  man-pages  project.   A
   description  of  the project, information about reporting bugs, and the
   latest    version    of    this    page,    can     be     found     at

                              2016-12-12                         TMPNAM(3)

More Linux Commands

recvfrom(2) - receive a message from a socket (Man Page)....
The recv(), recvfrom(), and recvmsg() calls are used to receive messages from a socket. They may be used to receive data on both connectionless and connection-o

rwarray(3am) write and read gawk arrays to from files.......
The rwarray extension adds two functions named writea(). and reada(), as follows. writea() This function takes a string argument, which is the name of the file

checkXML(1) An XML lint tool for KDE DocBook XML documents.
checkXML is a tool to check for syntax errors in KDE DocBook XML files. It can also be used for other DocBook based XML files, but you should use the less speci

lchown32(2) - change ownership of a file - Linux man page...
These system calls change the owner and group of a file. The chown(), fchown(), and lchown() system calls differ only in how the file is specified: * chown() ch

XDrawImageString(3) - draw image text - Linux manual page...
The XDrawImageString16 function is similar to XDrawImageString except that it uses 2-byte or 16-bit characters. Both functions also use both the foreground and

perlos400(1) - Perl version 5 on OS/400 - Linux manual page
This document describes various features of IBM s OS/400 operating system that will affect how Perl version 5 (hereafter just Perl) is compiled and/or runs. By

gethostbyname2(3) - get network host entry - Linux man page
The gethostbyname*(), gethostbyaddr*(), herror(), and hstrerror() functions are obsolete. Applications should use getaddrinfo(3), getnameinfo(3), and gai_strerr

regulatory.bin(5) - The Linux wireless regulatory database
regulatory.bin is the file used by the Linux wireless subsystem to keep its regulatory database information. It is read by crda upon the Linux kernels request f

getpwent(3) - get password file entry - Linux manual page...
The getpwent() function returns a pointer to a structure containing the broken-out fields of a record from the password database (e.g., the local password file

ldap_msgfree(3) - Wait for the result of an LDAP operation
The ldap_result() routine is used to wait for and return the result of an operation previously initiated by one of the LDAP asynchronous operation routines (e.g

ldap_start_tls_s(3) - LDAP TLS initialization routines......
These routines are used to initiate TLS processing on an LDAP session. ldap_start_tls_s() sends a StartTLS request to a server, waits for the reply, and then in

ppmtoeyuv(1) - convert a PPM image into a Berkeley YUV file
This program is part of Netpbm(1) ppmtoeyuv reads a PPM image as input and produces a Berkeley Encoder YUV (not the same as Abekas YUV) file on the Standard Out

We can't live, work or learn in freedom unless the software we use is free.