If you generated a key on a device which is vulnerable to ROCA, you are affected, nomatter where you store the key later on.
If you generated a key on a device which is vulnerable to ROCA, you are affected, nomatter where you store the key later on.