Reduce analyze_block_cipher_dispatch exceptions

Signed-off-by: Ryan Everett <ryan.everett@arm.com>
diff --git a/tests/scripts/analyze_outcomes.py b/tests/scripts/analyze_outcomes.py
index a54ece6..8c7f21f 100755
--- a/tests/scripts/analyze_outcomes.py
+++ b/tests/scripts/analyze_outcomes.py
@@ -562,17 +562,10 @@
                     # but these are not available in the accelerated component.
                     re.compile('Set( non-existent)? padding with (AES|CAMELLIA).*'),
                 ],
-                'test_suite_pkcs12': [
-                    # The en/decryption part of PKCS#12 is not yet supported.
-                    # The rest of PKCS#12 (key derivation) works, though.
-                    re.compile(r'PBE Encrypt, .*'),
-                    re.compile(r'PBE Decrypt, .*'),
-                ],
                 'test_suite_pkcs5': [
-                    # The en/decryption part of PKCS#5 is not yet supported.
+                    # The AES part of PKCS#5 PBES2 is not yet supported.
                     # The rest of PKCS#5 (PBKDF2) works, though.
-                    re.compile(r'PBES2 Encrypt, .*'),
-                    re.compile(r'PBES2 Decrypt .*'),
+                    re.compile(r'PBES2 .* AES-.*')
                 ],
                 'test_suite_pkparse': [
                     # PEM (called by pkparse) requires AES_C in order to decrypt