The new and modified CCA functions for remote key loading are used
together to create trusted blocks, and then generate or export keys
under the control of those trusted blocks. This figure summarizes
the flow of the CCA functions to show how they are used:
Figure 1. Typical
flow of callable services for remote key export