I solved this in a way that I created a password file with maskprocessor. It contained less than 200k passwords all separated by carriage return and line feed. Then I made a Windows batch script which read those passwords line by line from the password file:
..and used those in Sentry 2020 command line interface:
Code:
FOR /F "usebackq delims=" %a in ("C:\Users\winuser\Desktop\passfile.txt") do SentryCommand.exe mount /file test-volume.key /password %a /drive A /timeout 10 /volume encrypted-file
..and used those in Sentry 2020 command line interface:
Code:
Sentry.exe supports following command line options:
mount [/volume] file.raw [/key file.key] [/password 12345]
dismount [/volume] file.raw