config UPDATE remove unsupported features
diff --git a/src/server_config.c b/src/server_config.c
index 5fa4010..38631a7 100644
--- a/src/server_config.c
+++ b/src/server_config.c
@@ -4808,21 +4808,20 @@
     /* all features */
     const char *ietf_x509_cert_to_name[] = {NULL};
     /* no private-key-encryption, csr-generation, p10-csr-format, certificate-expiration-notification,
-     * encrypted-passwords, hidden-symmetric-keys, encrypted-symmetric-keys, hidden-private-keys, encrypted-private-keys
+     * encrypted-passwords, hidden-symmetric-keys, encrypted-symmetric-keys, hidden-private-keys, encrypted-private-keys,
+     * one-symmetric-key-format, one-asymmetric-key-format, symmetrically-encrypted-value-format,
+     * asymmetrically-encrypted-value-format, cms-enveloped-data-format, cms-encrypted-data-format,
+     * cleartext-symmetric-keys
      */
-    const char *ietf_crypto_types[] = {
-        "one-symmetric-key-format", "one-asymmetric-key-format", "symmetrically-encrypted-value-format",
-        "asymmetrically-encrypted-value-format", "cms-enveloped-data-format", "cms-encrypted-data-format",
-        "cleartext-passwords", "cleartext-symmetric-keys", "cleartext-private-keys", NULL
-    };
+    const char *ietf_crypto_types[] = {"cleartext-passwords", "cleartext-private-keys", NULL};
     /* all features */
     const char *ietf_tcp_common[] = {"keepalives-supported", NULL};
     /* all features */
     const char *ietf_tcp_server[] = {"tcp-server-keepalives", NULL};
-    /* all features */
-    const char *ietf_tcp_client[] = {"local-binding-supported", "tcp-client-keepalives", "proxy-connect", "socks5-gss-api", "socks5-username-password", NULL};
-    /* no ssh-x509-certs */
-    const char *ietf_ssh_common[] = {"transport-params", "public-key-generation", NULL};
+    /* no proxy-connect, socks5-gss-api, socks5-username-password */
+    const char *ietf_tcp_client[] = {"local-binding-supported", "tcp-client-keepalives", NULL};
+    /* no ssh-x509-certs, public-key-generation */
+    const char *ietf_ssh_common[] = {"transport-params", NULL};
     /* no ssh-server-keepalives and local-user-auth-hostbased */
     const char *ietf_ssh_server[] = {"local-users-supported", "local-user-auth-publickey", "local-user-auth-password", "local-user-auth-none", NULL};
     /* all features */
@@ -4839,14 +4838,12 @@
     const char *ietf_keystore[] = {"central-keystore-supported", "inline-definitions-supported", "asymmetric-keys", NULL};
     /* all features */
     const char *ietf_truststore[] = {"central-truststore-supported", "inline-definitions-supported", "certificates", "public-keys", NULL};
+    /* no public-key-generation */
+    const char *ietf_tls_common[] = {"tls10", "tls11", "tls12", "tls13", "hello-params", NULL};
+    /* no tls-server-keepalives, server-ident-raw-public-key, server-ident-tls12-psk, server-ident-tls13-epsk,
+     * client-auth-raw-public-key, client-auth-tls12-psk, client-auth-tls13-epsk */
+    const char *ietf_tls_server[] = {"server-ident-x509-cert", "client-auth-supported", "client-auth-x509-cert", NULL};
     /* all features */
-    const char *ietf_tls_common[] = {"tls10", "tls11", "tls12", "tls13", "hello-params", "public-key-generation", NULL};
-    /* all features */
-    const char *ietf_tls_server[] = {
-        "tls-server-keepalives", "server-ident-x509-cert", "server-ident-raw-public-key", "server-ident-tls12-psk",
-        "server-ident-tls13-epsk", "client-auth-supported", "client-auth-x509-cert", "client-auth-raw-public-key",
-        "client-auth-tls12-psk", "client-auth-tls13-epsk", NULL
-    };
     const char *iana_tls_cipher_suite_algs[] = {NULL};
     /* all features */
     const char *libnetconf2_netconf_server[] = {NULL};