tmpnam, tmpnam_r - create a name for a temporary file
#include <stdio.h> char *tmpnam(char *s); char *tmpnam_r(char *s); Feature Test Macro Requirements for glibc (see feature_test_macros(7)): tmpnam_r() Since glibc 2.19: _DEFAULT_SOURCE Up to and including glibc 2.19: _BSD_SOURCE || _SVID_SOURCE
Note: avoid using these functions; use mkstemp(3) or tmpfile(3) instead. The tmpnam() function returns a pointer to a string that is a valid filename, and such that a file with this name did not exist at some point in time, so that naive programmers may think it a suitable name for a temporary file. If the argument s is NULL, this name is generated in an internal static buffer and may be overwritten by the next call to tmpnam(). If s is not NULL, the name is copied to the character array (of length at least L_tmpnam) pointed to by s and the value s is returned in case of success. The created pathname has a directory prefix P_tmpdir. (Both L_tmpnam and P_tmpdir are defined in <stdio.h>, just like the TMP_MAX mentioned below.) The tmpnam_r() function performs the same task as tmpnam(), but returns NULL (to indicate an error) if s is NULL.
These functions return a pointer to a unique temporary filename, or NULL if a unique name cannot be generated.
No errors are defined.
For an explanation of the terms used in this section, see attributes(7). Interface Attribute Value tmpnam() Thread safety MT-Unsafe race:tmpnam/!s tmpnam_r() Thread safety MT-Safe
tmpnam(): SVr4, 4.3BSD, C89, C99, POSIX.1-2001. POSIX.1-2008 marks tmpnam() as obsolete. tmpnam_r() is a nonstandard extension that is also available on a few other systems.
The tmpnam() function generates a different string each time it is called, up to TMP_MAX times. If it is called more than TMP_MAX times, the behavior is implementation defined. Although these functions generate names that are difficult to guess, it is nevertheless possible that between the time that the pathname is returned and the time that the program opens it, another program might create that pathname using open(2), or create it as a symbolic link. This can lead to security holes. To avoid such possibilities, use the open(2) O_EXCL flag to open the pathname. Or better yet, use mkstemp(3) or tmpfile(3). Portable applications that use threads cannot call tmpnam() with a NULL argument if either _POSIX_THREADS or _POSIX_THREAD_SAFE_FUNCTIONS is defined.
This page is part of release 4.09 of the Linux man-pages project. A description of the project, information about reporting bugs, and the latest version of this page, can be found at https://www.kernel.org/doc/man-pages/. 2016-12-12 TMPNAM(3)
More Linux Commands
recvfrom(2) - receive a message from a socket (Man Page)....
The recv(), recvfrom(), and recvmsg() calls are used to receive messages from a socket. They may be used to receive data on both connectionless and connection-o
rwarray(3am) write and read gawk arrays to from files.......
The rwarray extension adds two functions named writea(). and reada(), as follows. writea() This function takes a string argument, which is the name of the file
checkXML(1) An XML lint tool for KDE DocBook XML documents.
checkXML is a tool to check for syntax errors in KDE DocBook XML files. It can also be used for other DocBook based XML files, but you should use the less speci
lchown32(2) - change ownership of a file - Linux man page...
These system calls change the owner and group of a file. The chown(), fchown(), and lchown() system calls differ only in how the file is specified: * chown() ch
XDrawImageString(3) - draw image text - Linux manual page...
The XDrawImageString16 function is similar to XDrawImageString except that it uses 2-byte or 16-bit characters. Both functions also use both the foreground and
perlos400(1) - Perl version 5 on OS/400 - Linux manual page
This document describes various features of IBM s OS/400 operating system that will affect how Perl version 5 (hereafter just Perl) is compiled and/or runs. By
gethostbyname2(3) - get network host entry - Linux man page
The gethostbyname*(), gethostbyaddr*(), herror(), and hstrerror() functions are obsolete. Applications should use getaddrinfo(3), getnameinfo(3), and gai_strerr
regulatory.bin(5) - The Linux wireless regulatory database
regulatory.bin is the file used by the Linux wireless subsystem to keep its regulatory database information. It is read by crda upon the Linux kernels request f
getpwent(3) - get password file entry - Linux manual page...
The getpwent() function returns a pointer to a structure containing the broken-out fields of a record from the password database (e.g., the local password file
ldap_msgfree(3) - Wait for the result of an LDAP operation
The ldap_result() routine is used to wait for and return the result of an operation previously initiated by one of the LDAP asynchronous operation routines (e.g
ldap_start_tls_s(3) - LDAP TLS initialization routines......
These routines are used to initiate TLS processing on an LDAP session. ldap_start_tls_s() sends a StartTLS request to a server, waits for the reply, and then in
ppmtoeyuv(1) - convert a PPM image into a Berkeley YUV file
This program is part of Netpbm(1) ppmtoeyuv reads a PPM image as input and produces a Berkeley Encoder YUV (not the same as Abekas YUV) file on the Standard Out