analyze_outcomes: update cipher/aead data

Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
diff --git a/tests/scripts/analyze_outcomes.py b/tests/scripts/analyze_outcomes.py
index e1d465d..706421f 100755
--- a/tests/scripts/analyze_outcomes.py
+++ b/tests/scripts/analyze_outcomes.py
@@ -219,42 +219,18 @@
         'args': {
             'component_ref': 'test_psa_crypto_config_reference_cipher_aead',
             'component_driver': 'test_psa_crypto_config_accel_cipher_aead',
-            # Ignore suites that are being accelerated
+            # Modules replaced by drivers.
             'ignored_suites': [
-                'aes.cbc',
-                'aes.cfb',
-                'aes.ecb',
-                'aes.ofb',
-                'aes.rest',
-                'aes.xts',
-                'aria',
-                'camellia',
-                'ccm',
-                'chacha20',
-                'chachapoly',
-                'cipher.aes',
-                'cipher.aria',
-                'cipher.camellia',
-                'cipher.ccm',
-                'cipher.chacha20',
-                'cipher.chachapoly',
-                'cipher.des',
-                'cipher.gcm',
-                'cipher.nist_kw',
-                'cipher.padding',
-                'des',
-                'gcm.aes128_de',
-                'gcm.aes128_en',
-                'gcm.aes192_de',
-                'gcm.aes192_en',
-                'gcm.aes256_de',
-                'gcm.aes256_en',
-                'gcm.camellia',
-                'gcm.misc',
-                'cmac',
+                # low-level (block/stream) cipher modules
+                'aes', 'aria', 'camellia', 'des', 'chacha20',
+                # AEAD modes
+                'ccm', 'chachapoly', 'cmac', 'gcm',
+                # The Cipher abstraction layer
+                'cipher',
             ],
             'ignored_tests': {
-                # Following tests depends on AES_C/DES_C
+                # PEM decryption is not supported so far.
+                # The rest of PEM (write, unencrypted read) works though.
                 'test_suite_pem': [
                     'PEM read (AES-128-CBC + invalid iv)'
                     'PEM read (DES-CBC + invalid iv)',
@@ -266,16 +242,18 @@
                     'PEM read (AES-128-CBC + invalid iv)',
                     'PEM read (DES-CBC + invalid iv)',
                 ],
-                # Following tests depends on AES_C/DES_C
+                # Following tests depend on AES_C/DES_C but are not about
+                # them really, just need to know some error code is there.
                 'test_suite_error': [
                     'Low and high error',
                     'Single low error'
                 ],
-                # Following test depends on AES_C
+                # Similar to test_suite_error above.
                 'test_suite_version': [
                     'Check for MBEDTLS_AES_C when already present',
                 ],
-                # Following tests depends on PCKS7
+                # The en/decryption part of PKCS#12 is not supported so far.
+                # The rest of PKCS#12 (key derivation) works though.
                 'test_suite_pkcs12': [
                     'PBE Decrypt, (Invalid padding & PKCS7 padding enabled)',
                     'PBE Decrypt, pad = 7 (OK)',
@@ -285,7 +263,8 @@
                     'PBE Encrypt, pad = 8 (Invalid output size)',
                     'PBE Encrypt, pad = 8 (OK)',
                 ],
-                # Following tests depends on PCKS7
+                # The en/decryption part of PKCS#5 is not supported so far.
+                # The rest of PKCS#5 (PBKDF2) works though.
                 'test_suite_pkcs5': [
                     'PBES2 Decrypt (Invalid output size)',
                     'PBES2 Decrypt (Invalid padding & PKCS7 padding enabled)',
@@ -319,7 +298,7 @@
                     'PBES2 Encrypt, pad=8 (Invalid output size)',
                     'PBES2 Encrypt, pad=8 (OK)',
                 ],
-                # Following tests depends on DES
+                # Encrypted keys are not supported so far.
                 # pylint: disable=line-too-long
                 'test_suite_pkparse': [
                     'Key ASN1 (Encrypted key PKCS12, trailing garbage data)',