diff --git a/testsuite/rsa2sexp-test.c b/testsuite/rsa2sexp-test.c
index f4ddcf853b41b8e1989cbd2162c8b2c602424eb7..781d40f590b36a0f58afe016a3271f0ab1d57833 100644
--- a/testsuite/rsa2sexp-test.c
+++ b/testsuite/rsa2sexp-test.c
@@ -48,6 +48,13 @@ test_main(void)
 
   nettle_buffer_init(&buffer);
   ASSERT(rsa_keypair_to_sexp(&buffer, &pub, &priv));
+
+  if (verbose)
+    {
+      printf("private:");
+      print_hex(buffer.size, buffer.contents);  
+    }
+  
   ASSERT(MEMEQH(buffer.size, buffer.contents,
 		"2831313a707269766174652d6b657928"
 		"333a72736128313a6e36333a085c3408"
@@ -70,12 +77,18 @@ test_main(void)
 		"6a8944f0b92928313a6233323a014875"
 		"1e622d6d58e3bb094afd6edacf737035"
 		"1d068e2ce9f565c5528c4a7473292831"
-		"3a6333313af8a458ea73a018dc6fa568"
-		"63e3bc6de405f364f77dee6f0962679e"
-		"a1a8282e292929"));
+		"3a6333323a00f8a458ea73a018dc6fa5"
+		"6863e3bc6de405f364f77dee6f096267"
+		"9ea1a8282e292929"));
 
   nettle_buffer_clear(&buffer);
   ASSERT(rsa_keypair_to_sexp(&buffer, &pub, NULL));
+
+  if (verbose)
+    {
+      printf("public:");
+      print_hex(buffer.size, buffer.contents);  
+    }
   ASSERT(MEMEQH(buffer.size, buffer.contents,
 		"2831303a7075626c69632d6b65792833"
 		"3a72736128313a6e36333a085c340898"