mirror of
https://github.com/XRPLF/rippled.git
synced 2025-11-23 12:35:50 +00:00
Fix bug in regular key set transactions.
This commit is contained in:
@@ -9,7 +9,8 @@ SETUP_LOG (RegularKeySetTransactor)
|
||||
|
||||
uint64 RegularKeySetTransactor::calculateBaseFee ()
|
||||
{
|
||||
if ( ! (mTxnAccount->getFlags () & lsfPasswordSpent)
|
||||
if ( mTxnAccount
|
||||
&& (! (mTxnAccount->getFlags () & lsfPasswordSpent))
|
||||
&& (mSigningPubKey.getAccountID () == mTxnAccountID))
|
||||
{
|
||||
// flag is armed and they signed with the right account
|
||||
|
||||
@@ -209,11 +209,10 @@ TER Transactor::apply ()
|
||||
|
||||
if (terResult != tesSUCCESS) return (terResult);
|
||||
|
||||
calculateFee ();
|
||||
|
||||
boost::recursive_mutex::scoped_lock sl (mEngine->getLedger ()->mLock);
|
||||
|
||||
mTxnAccount = mEngine->entryCache (ltACCOUNT_ROOT, Ledger::getAccountRootIndex (mTxnAccountID));
|
||||
calculateFee ();
|
||||
|
||||
// Find source account
|
||||
// If are only forwarding, due to resource limitations, we might verifying only some transactions, this would be probabilistic.
|
||||
|
||||
Reference in New Issue
Block a user