Fix Bluetooth OOB data parsing
In some early implementations of OOB, TK was send in bad, reversed
order, and was implemented in such way. This patch fixes that.
Bug: 30675596
Change-Id: Id6af6d96cd35ef118372319bab39862ba0501f29
diff --git a/src/com/android/nfc/handover/HandoverDataParser.java b/src/com/android/nfc/handover/HandoverDataParser.java
index eb77aaa..2921c67 100644
--- a/src/com/android/nfc/handover/HandoverDataParser.java
+++ b/src/com/android/nfc/handover/HandoverDataParser.java
@@ -443,15 +443,8 @@
break;
}
- byte[] reversedTK = new byte[len - 1];
- payload.get(reversedTK);
-
byte[] securityManagerTK = new byte[len - 1];
-
- //TK in AD is in reverse order
- for (int i = 0; i < reversedTK.length; i++) {
- securityManagerTK[i] = reversedTK[securityManagerTK.length - 1 - i];
- }
+ payload.get(securityManagerTK);
result.oobData = new OobData();
result.oobData.setSecurityManagerTk(securityManagerTK);