Firewall-related commands porting

Test: built, flashed, booted
      system/netd/tests/runtests.sh passes

Change-Id: I0fcf6ac4e5d96cbf63d6752bee7202cdef940e82
diff --git a/server/FirewallController.h b/server/FirewallController.h
index c43e94e..a7082da 100644
--- a/server/FirewallController.h
+++ b/server/FirewallController.h
@@ -23,16 +23,27 @@
 #include <string>
 #include <vector>
 
+#include "android/net/INetd.h"
+
 #include "NetdConstants.h"
 
-enum FirewallRule { DENY, ALLOW };
+namespace android {
+namespace net {
+
+enum FirewallRule { ALLOW = INetd::FIREWALL_RULE_ALLOW, DENY = INetd::FIREWALL_RULE_DENY };
 
 // WHITELIST means the firewall denies all by default, uids must be explicitly ALLOWed
 // BLACKLIST means the firewall allows all by default, uids must be explicitly DENYed
 
-enum FirewallType { WHITELIST, BLACKLIST };
+enum FirewallType { WHITELIST = INetd::FIREWALL_WHITELIST, BLACKLIST = INetd::FIREWALL_BLACKLIST };
 
-enum ChildChain { NONE, DOZABLE, STANDBY, POWERSAVE, INVALID_CHAIN };
+enum ChildChain {
+    NONE = INetd::FIREWALL_CHAIN_NONE,
+    DOZABLE = INetd::FIREWALL_CHAIN_DOZABLE,
+    STANDBY = INetd::FIREWALL_CHAIN_STANDBY,
+    POWERSAVE = INetd::FIREWALL_CHAIN_POWERSAVE,
+    INVALID_CHAIN
+};
 
 /*
  * Simple firewall that drops all packets except those matching explicitly
@@ -48,8 +59,8 @@
 
     int setupIptablesHooks(void);
 
-    int enableFirewall(FirewallType);
-    int disableFirewall(void);
+    int setFirewallType(FirewallType);
+    int resetFirewall(void);
     int isFirewallEnabled(void);
 
     /* Match traffic going in/out over the given iface. */
@@ -100,4 +111,7 @@
   FirewallType getFirewallType(ChildChain);
 };
 
+}  // namespace net
+}  // namespace android
+
 #endif