Understand Opportunistic Wireless Encryption Flow