The IEEE 802.11 standard does not provide a way to know ahead of time which of the two WEP authentication methods are available. A client would have to attempt an authentication using each method, and hope that the AP's implementation is good enough to return the right reason codes.
From my experience back in 1999-2002 when WEP was all we had, a lot of APs have crappy implementations of WEP authentication methods, and often send the wrong reason code (or fail to respond at all), so you really can't reliably differentiate between "bad key" and "algorithm not supported".
Although I don't have any personal experience with wpa_cli, I would be surprised if it has any mechanism to preflight which WEP algorithms are supported, since such a feature would be highly unreliable due to poor AP implementations, and would end up just frustrating everyone with incorrect or inconclusive results.
1I know this is completely unrelated to the question, but WEP has been known to be broken for a long time now and really shouldn't be used, you might at as well just leave the AP open with no encryption. – heavyd – 2015-01-15T18:07:41.000
Yes, but we still have customers who are using it. – parsley72 – 2015-01-15T18:09:43.380
1The last devices that could only support WEP were built c. 2003. Do you really have customers that have decade-old gear they can't upgrade? Or are they just using WEP for no good reason? Do them a favor and tell them to enable WPA2. – Spiff – 2015-01-15T18:23:58.383