Fix Bluetooth OOB data parsing

In some early implementations of OOB, TK was send in bad, reversed
order, and was implemented in such way. This patch fixes that.

Bug: 30675596
Change-Id: Id6af6d96cd35ef118372319bab39862ba0501f29
diff --git a/src/com/android/nfc/handover/HandoverDataParser.java b/src/com/android/nfc/handover/HandoverDataParser.java
index eb77aaa..2921c67 100644
--- a/src/com/android/nfc/handover/HandoverDataParser.java
+++ b/src/com/android/nfc/handover/HandoverDataParser.java
@@ -443,15 +443,8 @@
                             break;
                         }
 
-                        byte[] reversedTK = new byte[len - 1];
-                        payload.get(reversedTK);
-
                         byte[] securityManagerTK = new byte[len - 1];
-
-                        //TK in AD is in reverse order
-                        for (int i = 0; i < reversedTK.length; i++) {
-                            securityManagerTK[i] = reversedTK[securityManagerTK.length - 1 - i];
-                        }
+                        payload.get(securityManagerTK);
 
                         result.oobData = new OobData();
                         result.oobData.setSecurityManagerTk(securityManagerTK);