Deflake KeyUpdateInitiatedByConfidentialityLimit in //third_party/quic/core/http:end_to_end_test.

Tested with 1000 runs: http://sponge2/5ce59614-0c2a-4087-bed3-f6f486a86bf6

PiperOrigin-RevId: 393137028
diff --git a/quic/core/http/end_to_end_test.cc b/quic/core/http/end_to_end_test.cc
index e64d8e6..0969bdf 100644
--- a/quic/core/http/end_to_end_test.cc
+++ b/quic/core/http/end_to_end_test.cc
@@ -5884,7 +5884,7 @@
 }
 
 TEST_P(EndToEndTest, KeyUpdateInitiatedByConfidentialityLimit) {
-  SetQuicFlag(FLAGS_quic_key_update_confidentiality_limit, 4U);
+  SetQuicFlag(FLAGS_quic_key_update_confidentiality_limit, 16U);
 
   if (!version_.UsesTls()) {
     // Key Update is only supported in TLS handshake.
@@ -5910,9 +5910,11 @@
       },
       QuicTime::Delta::FromSeconds(5));
 
-  SendSynchronousFooRequestAndCheckResponse();
-  SendSynchronousFooRequestAndCheckResponse();
-  SendSynchronousFooRequestAndCheckResponse();
+  for (uint64_t i = 0;
+       i < GetQuicFlag(FLAGS_quic_key_update_confidentiality_limit); ++i) {
+    SendSynchronousFooRequestAndCheckResponse();
+  }
+
   // Don't know exactly how many packets will be sent in each request/response,
   // so just test that at least one key update occurred.
   EXPECT_LE(1u, client_connection->GetStats().key_update_count);