Fix bug with mpi_fill_random() on big-endian
diff --git a/ChangeLog b/ChangeLog
index 2f5be94..5598467 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -25,6 +25,8 @@
ServerHello when no extensions are present (found by Matthew Page)
* rsa_check_pubkey() now allows an E up to N
* On OpenBSD, use arc4random_buf() instead of rand() to prevent warnings
+ * mpi_fill_random() was creating numbers larger than requested on
+ big-endian platform when size was not an integer number of limbs
= PolarSSL 1.3.6 released on 2014-04-11