Description: Allow TLS tests to run as non-root user
 The spamd TLS tests involve starting spamd and binding to a TCP port.  Spamd's
 default TCP port is 783, and this is not overridden in the test, so the test
 must run as root in order for the bind() call to work.  Since the specific port
 isn't important for the test, we'll override it here to use a non-privileged
 port.
Author: Noah Meyerhans <noahm@debian.org>
Bug: https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7763
---
This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
diff --git a/t/spamd_ssl.t b/t/spamd_ssl.t
index 6a97d7c..2ca41d4 100755
--- a/t/spamd_ssl.t
+++ b/t/spamd_ssl.t
@@ -24,7 +24,7 @@ q{ This must be the very last line}, 'lastline',
 
 );
 
-ok (sdrun ("-L --ssl --server-key data/etc/testhost.key --server-cert data/etc/testhost.cert",
-           "--ssl < data/spam/001",
+ok (sdrun ("-L --ssl --server-key data/etc/testhost.key --server-cert data/etc/testhost.cert --port 1783",
+           "--port 1783 --ssl < data/spam/001",
            \&patterns_run_cb));
 ok_all_patterns();
diff --git a/t/spamd_ssl_accept_fail.t b/t/spamd_ssl_accept_fail.t
index 9fc697e..3512bec 100755
--- a/t/spamd_ssl_accept_fail.t
+++ b/t/spamd_ssl_accept_fail.t
@@ -25,9 +25,9 @@ q{ This must be the very last line}, 'lastline',
 
 );
 
-ok (start_spamd ("-L --ssl --server-key data/etc/testhost.key --server-cert data/etc/testhost.cert"));
-ok (spamcrun ("< data/spam/001", \&patterns_run_cb));
-ok (spamcrun ("--ssl < data/spam/001", \&patterns_run_cb));
+ok (start_spamd ("-L --ssl --server-key data/etc/testhost.key --server-cert data/etc/testhost.cert --port 1783"));
+ok (spamcrun ("--port 1783 < data/spam/001", \&patterns_run_cb));
+ok (spamcrun ("--port 1783 --ssl < data/spam/001", \&patterns_run_cb));
 ok (stop_spamd ());
 
 ok_all_patterns();
