Data authenticity and integrity checks using Keyed hash-based message authentication code (HMACs).
Available hash modes.