DESC_HDR_SEL0_AESU |
                                     DESC_HDR_MODE0_AESU_CTR,
        },
+       {       .type = CRYPTO_ALG_TYPE_SKCIPHER,
+               .alg.skcipher = {
+                       .base.cra_name = "ctr(aes)",
+                       .base.cra_driver_name = "ctr-aes-talitos",
+                       .base.cra_blocksize = 1,
+                       .base.cra_flags = CRYPTO_ALG_ASYNC |
+                                         CRYPTO_ALG_ALLOCATES_MEMORY,
+                       .min_keysize = AES_MIN_KEY_SIZE,
+                       .max_keysize = AES_MAX_KEY_SIZE,
+                       .ivsize = AES_BLOCK_SIZE,
+                       .setkey = skcipher_aes_setkey,
+               },
+               .desc_hdr_template = DESC_HDR_TYPE_COMMON_NONSNOOP_NO_AFEU |
+                                    DESC_HDR_SEL0_AESU |
+                                    DESC_HDR_MODE0_AESU_CTR,
+       },
        {       .type = CRYPTO_ALG_TYPE_SKCIPHER,
                .alg.skcipher = {
                        .base.cra_name = "ecb(des)",
                        t_alg->algt.alg.skcipher.setkey ?: skcipher_setkey;
                t_alg->algt.alg.skcipher.encrypt = skcipher_encrypt;
                t_alg->algt.alg.skcipher.decrypt = skcipher_decrypt;
+               if (!strcmp(alg->cra_name, "ctr(aes)") && !has_ftr_sec1(priv) &&
+                   DESC_TYPE(t_alg->algt.desc_hdr_template) !=
+                   DESC_TYPE(DESC_HDR_TYPE_AESU_CTR_NONSNOOP)) {
+                       devm_kfree(dev, t_alg);
+                       return ERR_PTR(-ENOTSUPP);
+               }
                break;
        case CRYPTO_ALG_TYPE_AEAD:
                alg = &t_alg->algt.alg.aead.base;